Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll
Resource
win10v2004-20220812-en
General
-
Target
8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll
-
Size
35KB
-
MD5
814f50853a0ad328a7c79ab2e68ef0d0
-
SHA1
3835f6cefcdd6b782fe93f748ce35a83bb1a3650
-
SHA256
8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89
-
SHA512
baa8847265640c04159d084d55f6cbb5bdbf53d71b33182fe94d4adf8cb2e4f2dd8033e5a025c07312d9550b83480185d89e623eeb6928d567041da2f1f17a71
-
SSDEEP
768:lTbxTgUxy3aRnXhX6SGBYJK01KGfH7iGEgnom0CiVF:lT10UxxXUSwGS2H7pbomRO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll,#12⤵PID:1156
-