Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
376b4e8e277f7904f32e8c45dc630b92bb2930837a252994830c02b9a3674c80.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
376b4e8e277f7904f32e8c45dc630b92bb2930837a252994830c02b9a3674c80.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
376b4e8e277f7904f32e8c45dc630b92bb2930837a252994830c02b9a3674c80.dll
-
Size
67KB
-
MD5
67256616b04f3c16a9662c138001787a
-
SHA1
44d6eef53b2c6139776ba55172f99b6259cd0435
-
SHA256
376b4e8e277f7904f32e8c45dc630b92bb2930837a252994830c02b9a3674c80
-
SHA512
92483b0ade6b4ed5883fbe5dbd0598b34ac06a1c184c684bdcf80935df60db90d91ecfe677913c6830431d863b3d437a6d77a10c38f4375bd73c6c798948b50f
-
SSDEEP
1536:JpcvBq2h8vA++e1OPqI0/6mqEr/Nr7Gbcp:Jp+hL++cSqpwEBr7h
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\376b4e8e277f7904f32e8c45dc630b92bb2930837a252994830c02b9a3674c80.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\376b4e8e277f7904f32e8c45dc630b92bb2930837a252994830c02b9a3674c80.dll,#12⤵PID:1948
-