Analysis
-
max time kernel
39s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 04:33
Static task
static1
Behavioral task
behavioral1
Sample
89755d7a009a183d9eb291b18e7b9baf4922b33994aa800259a80f9718695154.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89755d7a009a183d9eb291b18e7b9baf4922b33994aa800259a80f9718695154.dll
Resource
win10v2004-20220812-en
General
-
Target
89755d7a009a183d9eb291b18e7b9baf4922b33994aa800259a80f9718695154.dll
-
Size
76KB
-
MD5
28b97b12ae5dd5196f685858a0e93bc7
-
SHA1
c451d67a4430875203f45cc2a4cab8fd04f6e992
-
SHA256
89755d7a009a183d9eb291b18e7b9baf4922b33994aa800259a80f9718695154
-
SHA512
54cd639d0bed985628874349adcd2a4a250089bc042bc5cd4fc791617ea10e4aca874bb0ed0fca1fd04a93be52e1c953a2c2cb9642f7a6e843087429665df73b
-
SSDEEP
1536:iFzN559FOhzxM5qZQFsoGW+mLDZL7tqVE4oiwC2p8Be8VdUUdOZY8/D:gzPkzxXZ0F+41k21iwCf1dUUwNL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1100 1072 rundll32.exe 27 PID 1072 wrote to memory of 1100 1072 rundll32.exe 27 PID 1072 wrote to memory of 1100 1072 rundll32.exe 27 PID 1072 wrote to memory of 1100 1072 rundll32.exe 27 PID 1072 wrote to memory of 1100 1072 rundll32.exe 27 PID 1072 wrote to memory of 1100 1072 rundll32.exe 27 PID 1072 wrote to memory of 1100 1072 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89755d7a009a183d9eb291b18e7b9baf4922b33994aa800259a80f9718695154.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89755d7a009a183d9eb291b18e7b9baf4922b33994aa800259a80f9718695154.dll,#12⤵PID:1100
-