Analysis
-
max time kernel
27s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
e60fe88d07e2d53e54b98e8d44bf743db87f8f3ad55da9b3fe7376a9c34992c3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e60fe88d07e2d53e54b98e8d44bf743db87f8f3ad55da9b3fe7376a9c34992c3.dll
Resource
win10v2004-20220812-en
General
-
Target
e60fe88d07e2d53e54b98e8d44bf743db87f8f3ad55da9b3fe7376a9c34992c3.dll
-
Size
112KB
-
MD5
7bdaea42c509bf8fd64124500d15faef
-
SHA1
78bf18be728ba46a0e2c93e7fda15bd5ed2f720e
-
SHA256
e60fe88d07e2d53e54b98e8d44bf743db87f8f3ad55da9b3fe7376a9c34992c3
-
SHA512
241800392bd794e4fd9bf799d6a5da193eae24e6b047bdec8c817bfd27b501ba259b7e14aacae0c0b074cb8882696927847cbb34e2ef93412fec6807f1f42b5f
-
SSDEEP
1536:d7DfFWPk49tV+uy5PV1C5NDVqLDaCJXk0V0XZ27uVhGk2y5eLVQKZtAmHnR:dNW849tEXaH8LDaCB6xX5gzAmHnR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1888 1016 rundll32.exe 28 PID 1016 wrote to memory of 1888 1016 rundll32.exe 28 PID 1016 wrote to memory of 1888 1016 rundll32.exe 28 PID 1016 wrote to memory of 1888 1016 rundll32.exe 28 PID 1016 wrote to memory of 1888 1016 rundll32.exe 28 PID 1016 wrote to memory of 1888 1016 rundll32.exe 28 PID 1016 wrote to memory of 1888 1016 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e60fe88d07e2d53e54b98e8d44bf743db87f8f3ad55da9b3fe7376a9c34992c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e60fe88d07e2d53e54b98e8d44bf743db87f8f3ad55da9b3fe7376a9c34992c3.dll,#12⤵PID:1888
-