Analysis
-
max time kernel
41s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 02:12
Static task
static1
Behavioral task
behavioral1
Sample
41c8854ff037e0768a5fee7d7eddb9fbec76f374bbdfd60aa7f618d076ceba3d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41c8854ff037e0768a5fee7d7eddb9fbec76f374bbdfd60aa7f618d076ceba3d.dll
Resource
win10v2004-20220812-en
General
-
Target
41c8854ff037e0768a5fee7d7eddb9fbec76f374bbdfd60aa7f618d076ceba3d.dll
-
Size
354KB
-
MD5
13c17ec1209803d42a818c43e5c29950
-
SHA1
4b07b5726de239e929d2a456a01c643228cd18cc
-
SHA256
41c8854ff037e0768a5fee7d7eddb9fbec76f374bbdfd60aa7f618d076ceba3d
-
SHA512
56e87dc2bf684893904347da5914b4d4b4585d7ae0e51f8a92332afe6e7d2f14be24e91fe65af85a4bbff7cb7be9e363e14b0d988e24b7737384b9112eb32b53
-
SSDEEP
6144:sdlW/AuEbRFitn3CvQxxUZnlfFOlsvki8gt/R5r0d/sMZepwLTTCKH6aj0GtuvoZ:SFbzkCdfwlsvki8gt/MdPZjqvGDH5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1620 1208 rundll32.exe 27 PID 1208 wrote to memory of 1620 1208 rundll32.exe 27 PID 1208 wrote to memory of 1620 1208 rundll32.exe 27 PID 1208 wrote to memory of 1620 1208 rundll32.exe 27 PID 1208 wrote to memory of 1620 1208 rundll32.exe 27 PID 1208 wrote to memory of 1620 1208 rundll32.exe 27 PID 1208 wrote to memory of 1620 1208 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41c8854ff037e0768a5fee7d7eddb9fbec76f374bbdfd60aa7f618d076ceba3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41c8854ff037e0768a5fee7d7eddb9fbec76f374bbdfd60aa7f618d076ceba3d.dll,#12⤵PID:1620
-