Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 15:10
Static task
static1
Behavioral task
behavioral1
Sample
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll
Resource
win10v2004-20220901-en
General
-
Target
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll
-
Size
273KB
-
MD5
905adc952fd5f9290b5961ffbf5a1bfb
-
SHA1
345dd071cdbf0eeecf789dfd555cff81f9aa956b
-
SHA256
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d
-
SHA512
fe222cde3d8afa26803de45a8c82c4bfa40e749ca5148384465eb7d5daca8ca25abf2c6b05345acf9edda0129521a0bf768cbd61a4368bedef5b6e437447f601
-
SSDEEP
6144:UOSjIXo9jPDv5eisvDs8W7s9ZuJrUO//oOqzTzlUK/zNFe5kQn:T549zDUis7s8W7GYAOqWAMiQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1412 wrote to memory of 288 1412 rundll32.exe 27 PID 1412 wrote to memory of 288 1412 rundll32.exe 27 PID 1412 wrote to memory of 288 1412 rundll32.exe 27 PID 1412 wrote to memory of 288 1412 rundll32.exe 27 PID 1412 wrote to memory of 288 1412 rundll32.exe 27 PID 1412 wrote to memory of 288 1412 rundll32.exe 27 PID 1412 wrote to memory of 288 1412 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll,#12⤵PID:288
-