Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 17:00
Behavioral task
behavioral1
Sample
26a2f70d151ea14891b6489855d6cc0f91a1bc7f48107e824ead652215770a7d.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
26a2f70d151ea14891b6489855d6cc0f91a1bc7f48107e824ead652215770a7d.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
26a2f70d151ea14891b6489855d6cc0f91a1bc7f48107e824ead652215770a7d.dll
-
Size
56KB
-
MD5
501ea7ea6b877ae1c91d48153c804ce0
-
SHA1
b8842f348e4f41542e9909896dfafa1262d7b22f
-
SHA256
26a2f70d151ea14891b6489855d6cc0f91a1bc7f48107e824ead652215770a7d
-
SHA512
c90374274433575fb157aab1bcbaaabb65c8cb91748025f6acea32242f348efbf248bf0e8ad0354efe9e9b1ae5d6c06f1e67172b45d2bba5ad9f5a37af344167
-
SSDEEP
1536:mPO6KEVbsVP0gZVuGFMuqLfIR/7s29dzvEAwQJGZ:cMEVbsVceVJd9dTEAwQJGZ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1748 1484 rundll32.exe 27 PID 1484 wrote to memory of 1748 1484 rundll32.exe 27 PID 1484 wrote to memory of 1748 1484 rundll32.exe 27 PID 1484 wrote to memory of 1748 1484 rundll32.exe 27 PID 1484 wrote to memory of 1748 1484 rundll32.exe 27 PID 1484 wrote to memory of 1748 1484 rundll32.exe 27 PID 1484 wrote to memory of 1748 1484 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26a2f70d151ea14891b6489855d6cc0f91a1bc7f48107e824ead652215770a7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26a2f70d151ea14891b6489855d6cc0f91a1bc7f48107e824ead652215770a7d.dll,#12⤵PID:1748
-