Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 16:35
Behavioral task
behavioral1
Sample
0e7f65fbfbf707ad33498aa5280ff84126e3778e3be6f1c583e6fd6dda926a7b.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e7f65fbfbf707ad33498aa5280ff84126e3778e3be6f1c583e6fd6dda926a7b.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
0e7f65fbfbf707ad33498aa5280ff84126e3778e3be6f1c583e6fd6dda926a7b.dll
-
Size
87KB
-
MD5
963c4b2206fa21ed37eec05f65a853d0
-
SHA1
b2565ca6f665931f2957fc01f34e0a74996b48c7
-
SHA256
0e7f65fbfbf707ad33498aa5280ff84126e3778e3be6f1c583e6fd6dda926a7b
-
SHA512
1f4f236696d333f6ac5801cca1dec46598b48eb8cd339ae528c6a602ddda32387a61894822e9b3fbc1eda746e20591e1f7841cbc1ab830ff31945a32e31e41e0
-
SSDEEP
1536:2moLIIWdNE9jv4LsBgI9H++NPdABhbGVd8mcS71PMdZthy1:f2RWdNEp4Ls2wH++mhb8xPMXthy
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1968 2020 rundll32.exe 28 PID 2020 wrote to memory of 1968 2020 rundll32.exe 28 PID 2020 wrote to memory of 1968 2020 rundll32.exe 28 PID 2020 wrote to memory of 1968 2020 rundll32.exe 28 PID 2020 wrote to memory of 1968 2020 rundll32.exe 28 PID 2020 wrote to memory of 1968 2020 rundll32.exe 28 PID 2020 wrote to memory of 1968 2020 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e7f65fbfbf707ad33498aa5280ff84126e3778e3be6f1c583e6fd6dda926a7b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e7f65fbfbf707ad33498aa5280ff84126e3778e3be6f1c583e6fd6dda926a7b.dll,#12⤵PID:1968
-