Analysis
-
max time kernel
2s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 14:58
Behavioral task
behavioral1
Sample
e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea.dll
-
Size
164KB
-
MD5
cfefcc2edc5c54c74b76e7d1d29e69b2
-
SHA1
7423c57db390def08154b77e2b5e043d92d320c7
-
SHA256
e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea
-
SHA512
62d16f32a1c7d1063aa092a418555bd979f43367310f4ea4cd2eadd4edf4bbde474401980281d3d1fe3788245a25bab8280ce1ac1ffd83eee0ed38f026ececfd
-
SSDEEP
3072:efufigrn2u3DsLEai2XGmSQEjv5TpF+OjN57YHONxUrtUYU/99:efufJ28DSRi2W5jh7xz78O//
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1964 1324 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea.dll,#12⤵PID:1964