Analysis
-
max time kernel
27s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
a761afe806c5caf68ecb9fd8c2a6518cd3f9a3806164aa691780ff83e916e2e5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a761afe806c5caf68ecb9fd8c2a6518cd3f9a3806164aa691780ff83e916e2e5.dll
Resource
win10v2004-20220812-en
General
-
Target
a761afe806c5caf68ecb9fd8c2a6518cd3f9a3806164aa691780ff83e916e2e5.dll
-
Size
687KB
-
MD5
a1607e6d9f39cb80d92f7a953eb15c00
-
SHA1
81687a7189de6547a7db3da29915f4f778a3d24a
-
SHA256
a761afe806c5caf68ecb9fd8c2a6518cd3f9a3806164aa691780ff83e916e2e5
-
SHA512
0e1946ee9c4747b805099125508ee0062d903e1977e17158e5995c756c31ba470eaf9ac99a6416791b401f9f5aa952ff1ab426d0888976c4a22fa11e70ab5339
-
SSDEEP
3072:pkn3/AdL6IaHKP4qrEwT+0RNNLgFF5ptqmu7cl8GFyJ:ptdL73A+Tt8dtqmg0nyJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a761afe806c5caf68ecb9fd8c2a6518cd3f9a3806164aa691780ff83e916e2e5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a761afe806c5caf68ecb9fd8c2a6518cd3f9a3806164aa691780ff83e916e2e5.dll,#12⤵PID:1160
-