Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
084bf7d24e82c2db0db4086d75373fdc1e4b30f7a6318b32d00695070b319674.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
084bf7d24e82c2db0db4086d75373fdc1e4b30f7a6318b32d00695070b319674.dll
Resource
win10v2004-20220901-en
General
-
Target
084bf7d24e82c2db0db4086d75373fdc1e4b30f7a6318b32d00695070b319674.dll
-
Size
24KB
-
MD5
6059dab6acbf222ca7b886c1897b9983
-
SHA1
c11c1b3ffd1606393917f4eff83966585e749ce8
-
SHA256
084bf7d24e82c2db0db4086d75373fdc1e4b30f7a6318b32d00695070b319674
-
SHA512
197b63634e89a4efd91096db41fd41c1ca5f69bfae64e61ed175e6da1bd429b53d90919bd569a908b788d1e450ed9c0688dc00ec9b31d8efdbad443ff5ba5253
-
SSDEEP
192:IsNGS9RWanc9Lht82SrBOUzk9m4VM8GjFVemPej8V1TqMXkH:IcG8W59LhtEQA/4O82FV9PS8VkwkH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1628 1504 rundll32.exe 27 PID 1504 wrote to memory of 1628 1504 rundll32.exe 27 PID 1504 wrote to memory of 1628 1504 rundll32.exe 27 PID 1504 wrote to memory of 1628 1504 rundll32.exe 27 PID 1504 wrote to memory of 1628 1504 rundll32.exe 27 PID 1504 wrote to memory of 1628 1504 rundll32.exe 27 PID 1504 wrote to memory of 1628 1504 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\084bf7d24e82c2db0db4086d75373fdc1e4b30f7a6318b32d00695070b319674.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\084bf7d24e82c2db0db4086d75373fdc1e4b30f7a6318b32d00695070b319674.dll,#12⤵PID:1628
-