Analysis
-
max time kernel
94s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll
Resource
win10v2004-20220901-en
General
-
Target
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll
-
Size
273KB
-
MD5
905adc952fd5f9290b5961ffbf5a1bfb
-
SHA1
345dd071cdbf0eeecf789dfd555cff81f9aa956b
-
SHA256
7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d
-
SHA512
fe222cde3d8afa26803de45a8c82c4bfa40e749ca5148384465eb7d5daca8ca25abf2c6b05345acf9edda0129521a0bf768cbd61a4368bedef5b6e437447f601
-
SSDEEP
6144:UOSjIXo9jPDv5eisvDs8W7s9ZuJrUO//oOqzTzlUK/zNFe5kQn:T549zDUis7s8W7GYAOqWAMiQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 544 4960 rundll32.exe 82 PID 4960 wrote to memory of 544 4960 rundll32.exe 82 PID 4960 wrote to memory of 544 4960 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7cf5a73cf455f945aa4843c7be587401dd13c5c4be777a41826a4e38e3528f8d.dll,#12⤵PID:544
-