Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 06:34
Behavioral task
behavioral1
Sample
6e26c6aa09ca13cd23094ac5f88f9c53bc719f3d8795110a250af81bd892f49b.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6e26c6aa09ca13cd23094ac5f88f9c53bc719f3d8795110a250af81bd892f49b.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
6e26c6aa09ca13cd23094ac5f88f9c53bc719f3d8795110a250af81bd892f49b.dll
-
Size
94KB
-
MD5
47a21d6eb50bef72c10292c02b88b1b5
-
SHA1
bf966faca1e65664e70b6df9b55c23edcef38246
-
SHA256
6e26c6aa09ca13cd23094ac5f88f9c53bc719f3d8795110a250af81bd892f49b
-
SHA512
574dbcbcbe3a076e225ce15a8c8f08e1dd3c7569dbe2dabbbe61f46f5c6ed3f19d54e52b54927c1013927c5b3081c6da7dd7d08a7f86324f07b7b2c1a9a34e05
-
SSDEEP
1536:SQclh8MIwu5+oYtdTPqCLL7vSJ65uTcjEW0JruPMvO3ZyoTo6:ahdIw/oY9WiCPW0IPMvO3Zjt
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e26c6aa09ca13cd23094ac5f88f9c53bc719f3d8795110a250af81bd892f49b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e26c6aa09ca13cd23094ac5f88f9c53bc719f3d8795110a250af81bd892f49b.dll,#12⤵PID:1928
-