Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 02:29
Static task
static1
Behavioral task
behavioral1
Sample
19e5f63d7e861968c152065ce97735586d6f87bdd57231c50e8e68a89a4acd58.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19e5f63d7e861968c152065ce97735586d6f87bdd57231c50e8e68a89a4acd58.dll
Resource
win10v2004-20220901-en
General
-
Target
19e5f63d7e861968c152065ce97735586d6f87bdd57231c50e8e68a89a4acd58.dll
-
Size
214KB
-
MD5
311520a20597ce389807e220adaa82fb
-
SHA1
df68a8ac6eabf227145500a17a67d5a83470e9d4
-
SHA256
19e5f63d7e861968c152065ce97735586d6f87bdd57231c50e8e68a89a4acd58
-
SHA512
35027a3fc28be7454b9a38a50e98b9551d0334bb1c00dc8a4504297047bf50434723467476cdb921d127ac29d7b8bb5f3f491aac7b05a94fae5aafb0ebe90aa7
-
SSDEEP
3072:kU0qfGhxZoYFqsxz3kUrnM+Y+jpaBReqNSvrNDqekRN6R+wcrq4RN0vuE:XNfGTp3BTlY+laBbYTNOhRN6RuYG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19e5f63d7e861968c152065ce97735586d6f87bdd57231c50e8e68a89a4acd58.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19e5f63d7e861968c152065ce97735586d6f87bdd57231c50e8e68a89a4acd58.dll,#12⤵PID:1236
-