Analysis
-
max time kernel
19s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
f795f9a2e2ee358a4a1ac5b8980be60ea9492e641068e8338ff0daf84260c5a1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f795f9a2e2ee358a4a1ac5b8980be60ea9492e641068e8338ff0daf84260c5a1.dll
Resource
win10v2004-20220901-en
General
-
Target
f795f9a2e2ee358a4a1ac5b8980be60ea9492e641068e8338ff0daf84260c5a1.dll
-
Size
166KB
-
MD5
6ec76bb7985798b3db9e547b0cc44060
-
SHA1
81129575d5f4b1db18ad494d5c4ef24cff6ef5c2
-
SHA256
f795f9a2e2ee358a4a1ac5b8980be60ea9492e641068e8338ff0daf84260c5a1
-
SHA512
2d58596a79e00ed828e713077688b0053cefdaf5fd4062c070367ad8278e94cd6a16ba40444abfcaf23774811d1502f1f94dd1fb2880adaa3a047587f9252a33
-
SSDEEP
1536:9cI1e7iPEfxRXqQxPvFE/doYWG9zNWS3Qq5zl5RHar7Ok+ElKZjwSPQ+00OwPFz:9cqE4QxP9E79zNfXxl51027rPZa8geE
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 932 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1072 wrote to memory of 932 1072 rundll32.exe 27 PID 1072 wrote to memory of 932 1072 rundll32.exe 27 PID 1072 wrote to memory of 932 1072 rundll32.exe 27 PID 1072 wrote to memory of 932 1072 rundll32.exe 27 PID 1072 wrote to memory of 932 1072 rundll32.exe 27 PID 1072 wrote to memory of 932 1072 rundll32.exe 27 PID 1072 wrote to memory of 932 1072 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f795f9a2e2ee358a4a1ac5b8980be60ea9492e641068e8338ff0daf84260c5a1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f795f9a2e2ee358a4a1ac5b8980be60ea9492e641068e8338ff0daf84260c5a1.dll,#12⤵
- Suspicious use of FindShellTrayWindow
PID:932
-