Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 04:15
Behavioral task
behavioral1
Sample
a637795303a7c7ca2c8842e5686aa67bd9a33ab34bbbb6b81233ec84cb95ad5d.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a637795303a7c7ca2c8842e5686aa67bd9a33ab34bbbb6b81233ec84cb95ad5d.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
a637795303a7c7ca2c8842e5686aa67bd9a33ab34bbbb6b81233ec84cb95ad5d.dll
-
Size
99KB
-
MD5
1426570fe4e0c778a2d9eb46ffb4bc0c
-
SHA1
dbf6ab4c5c147a430302a160aeba7f9c0f47b135
-
SHA256
a637795303a7c7ca2c8842e5686aa67bd9a33ab34bbbb6b81233ec84cb95ad5d
-
SHA512
a4f2f01bcb1da70396139972ec03196624f83deae747f52518c3850abdea0c3214dc8170e58de727caf3311f271c177ce531b0d89a8abd2f7b12f0df3b5499de
-
SSDEEP
1536:qWNTI2j7IGPmy5guIRpanJIIxO91w7moPuhzLv2QktfAiNgN5L:qWNTHTey5HCInewi9flsRuNl
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1120-56-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a637795303a7c7ca2c8842e5686aa67bd9a33ab34bbbb6b81233ec84cb95ad5d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a637795303a7c7ca2c8842e5686aa67bd9a33ab34bbbb6b81233ec84cb95ad5d.dll,#12⤵PID:1120
-