Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
fd2d07a5fe44fb7868dd3e397ffadb4c08f5ac7a9447216aee8bbe39997d46f8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fd2d07a5fe44fb7868dd3e397ffadb4c08f5ac7a9447216aee8bbe39997d46f8.dll
Resource
win10v2004-20220901-en
General
-
Target
fd2d07a5fe44fb7868dd3e397ffadb4c08f5ac7a9447216aee8bbe39997d46f8.dll
-
Size
360KB
-
MD5
44e37512b8dbb7433a9b4158bc63e071
-
SHA1
34f600552c27dabfd094fce797743e49132f33db
-
SHA256
fd2d07a5fe44fb7868dd3e397ffadb4c08f5ac7a9447216aee8bbe39997d46f8
-
SHA512
407e722ca81763f1f60c8d6b00b3dae2a812e10b3a99c92b65447360bbf973ffcff9028db9bb0a70a381d4d7379c8a5036b26f970c666f6c45d0bee85b0098c5
-
SSDEEP
6144:bwM3I4nEYm2WLZz9PGGISkraoIX4NRZLLd/BZpymJZBS+tSfEwv5wyQ:EkI4nJmRz9PGGjkrgoN9Ppymfkn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd2d07a5fe44fb7868dd3e397ffadb4c08f5ac7a9447216aee8bbe39997d46f8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd2d07a5fe44fb7868dd3e397ffadb4c08f5ac7a9447216aee8bbe39997d46f8.dll,#12⤵PID:1156
-