Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
25735b935338c3df812d6b8acf6e71e4fc05fcc9531478549fdd488030c2a174.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25735b935338c3df812d6b8acf6e71e4fc05fcc9531478549fdd488030c2a174.dll
Resource
win10v2004-20220901-en
General
-
Target
25735b935338c3df812d6b8acf6e71e4fc05fcc9531478549fdd488030c2a174.dll
-
Size
147KB
-
MD5
69c75278dd66453c4ace3ac537762fef
-
SHA1
e6061928dd6167cf35186acc987aa7ac6c46948c
-
SHA256
25735b935338c3df812d6b8acf6e71e4fc05fcc9531478549fdd488030c2a174
-
SHA512
cadcee51ce74948bf70fe3e8ca4e80b8a81ea82e6f4ad25058d8803adf648d57b24340137b67f207ff5d1d865610192d3936c861b1ab5003bce3396e20667a76
-
SSDEEP
1536:yAcIfMI7IjkuvfZ/AuwdcLN3KybbUm8odCwPXkdrNYVWmCcno7GBTAcsqd1KJb:yXfU8xvfGdo3KAFgdrNYVWfcPAsc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25735b935338c3df812d6b8acf6e71e4fc05fcc9531478549fdd488030c2a174.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25735b935338c3df812d6b8acf6e71e4fc05fcc9531478549fdd488030c2a174.dll,#12⤵PID:872
-