Analysis
-
max time kernel
28s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 06:28
Behavioral task
behavioral1
Sample
06ef7ae6ca6df86e3a18b9771cf0dd7c0f1171104251c3d005ec882262b3ce5c.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
06ef7ae6ca6df86e3a18b9771cf0dd7c0f1171104251c3d005ec882262b3ce5c.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
06ef7ae6ca6df86e3a18b9771cf0dd7c0f1171104251c3d005ec882262b3ce5c.dll
-
Size
47KB
-
MD5
56cc8f8aa472be3e9152adc94af8585a
-
SHA1
769eb9c1e9bcd9df3020178f39a553b9b9727f6d
-
SHA256
06ef7ae6ca6df86e3a18b9771cf0dd7c0f1171104251c3d005ec882262b3ce5c
-
SHA512
ef9081dbc66b9f986217318a2940bd867b14579b11683f9382a425408a04525a9add9a7962f3e19f9e75cc7a1a9d358165b9f788e74871fd86fa893a86186720
-
SSDEEP
768:h8WTpVT0X8zbXN6jY40OqOxWryjRuogZYaN0zi+7JVUTRcgtaHetuZGca:RVLKrNqOxWryjRuoajwJaTRnoHiucD
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06ef7ae6ca6df86e3a18b9771cf0dd7c0f1171104251c3d005ec882262b3ce5c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06ef7ae6ca6df86e3a18b9771cf0dd7c0f1171104251c3d005ec882262b3ce5c.dll,#12⤵PID:1492
-