Analysis
-
max time kernel
15s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
9923843d94cb304ce8b84396a44ed0f1f05048f4f1c4055f76e5dba6ca22308f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9923843d94cb304ce8b84396a44ed0f1f05048f4f1c4055f76e5dba6ca22308f.dll
Resource
win10v2004-20220812-en
General
-
Target
9923843d94cb304ce8b84396a44ed0f1f05048f4f1c4055f76e5dba6ca22308f.dll
-
Size
10KB
-
MD5
a0d40fa5a8bc3103b9cfe1d9954a7187
-
SHA1
861c84f0c5dc352f1665034c253a8e097538ffb1
-
SHA256
9923843d94cb304ce8b84396a44ed0f1f05048f4f1c4055f76e5dba6ca22308f
-
SHA512
090abd81198df5190fe891670e4a8d0ff33c267885846eea973616053e4797e057c5db311c7eb1621fc35fcb912cacdef919fefcb3a2696064b574bd1df6e379
-
SSDEEP
192:Sw8dHabRDEgtHyl0NSypWak6HVdW3yWak8QjdW3w92b:6dHad/N20IypWak8dWiWak8EdW7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1296 1600 rundll32.exe 27 PID 1600 wrote to memory of 1296 1600 rundll32.exe 27 PID 1600 wrote to memory of 1296 1600 rundll32.exe 27 PID 1600 wrote to memory of 1296 1600 rundll32.exe 27 PID 1600 wrote to memory of 1296 1600 rundll32.exe 27 PID 1600 wrote to memory of 1296 1600 rundll32.exe 27 PID 1600 wrote to memory of 1296 1600 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9923843d94cb304ce8b84396a44ed0f1f05048f4f1c4055f76e5dba6ca22308f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9923843d94cb304ce8b84396a44ed0f1f05048f4f1c4055f76e5dba6ca22308f.dll,#12⤵PID:1296
-