Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
e7b8cfec0a474eb5af46082763c0fb6715720b535243a33b1b4db82938643022.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e7b8cfec0a474eb5af46082763c0fb6715720b535243a33b1b4db82938643022.dll
Resource
win10v2004-20220812-en
General
-
Target
e7b8cfec0a474eb5af46082763c0fb6715720b535243a33b1b4db82938643022.dll
-
Size
107KB
-
MD5
1a7c14e586472d4ffe788604a9a9c272
-
SHA1
68c774a2d3f328da32367b26e9e56e01fbb3e471
-
SHA256
e7b8cfec0a474eb5af46082763c0fb6715720b535243a33b1b4db82938643022
-
SHA512
49fab7a12e8ea606cc8119caa1d07253fc8a8714357f8ec87498d8a3bf41719de030953e19d4014d1a03c814c89b388e4ea3e92670bcc531c51126f66e5967d0
-
SSDEEP
1536:pn12GQV2E4XdYwTtfzjv0G/h6ReBH088N1z+l6D1gPKaoZzMzJidm:x12t2EOd3/gReBHIN1Ca1gNodMzOm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7b8cfec0a474eb5af46082763c0fb6715720b535243a33b1b4db82938643022.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7b8cfec0a474eb5af46082763c0fb6715720b535243a33b1b4db82938643022.dll,#12⤵PID:1344
-