Analysis
-
max time kernel
17s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
7b5ff2ca798c9a612e33f262029733ddd393f48ddd7f0c4219d71d3f08f48299.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7b5ff2ca798c9a612e33f262029733ddd393f48ddd7f0c4219d71d3f08f48299.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
7b5ff2ca798c9a612e33f262029733ddd393f48ddd7f0c4219d71d3f08f48299.dll
-
Size
33KB
-
MD5
a08484fcd722fdc62397e99b5eb8546a
-
SHA1
80d7caddce21b951c6ae712a6b3f36afb646d28b
-
SHA256
7b5ff2ca798c9a612e33f262029733ddd393f48ddd7f0c4219d71d3f08f48299
-
SHA512
e5468360a1c2396664d7e709f4d1854d281f46ddd3782b069bfa54d1414535d3f834bbb92b13b0f4a71f4c9e7755ac183f66f13604c69b451cba0f4942d9d896
-
SSDEEP
768:Af/fosuj44q2F3FLBa7H7Qt7kZYnhYDLR0NR:qnozB4bY7kZ0+vR0/
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1804 1016 rundll32.exe 27 PID 1016 wrote to memory of 1804 1016 rundll32.exe 27 PID 1016 wrote to memory of 1804 1016 rundll32.exe 27 PID 1016 wrote to memory of 1804 1016 rundll32.exe 27 PID 1016 wrote to memory of 1804 1016 rundll32.exe 27 PID 1016 wrote to memory of 1804 1016 rundll32.exe 27 PID 1016 wrote to memory of 1804 1016 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b5ff2ca798c9a612e33f262029733ddd393f48ddd7f0c4219d71d3f08f48299.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b5ff2ca798c9a612e33f262029733ddd393f48ddd7f0c4219d71d3f08f48299.dll,#12⤵PID:1804
-