Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
143165892b6b4d001cbf2eb65c8cd2428b913eff7de1b58b4e4d2afd4c6f96c3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
143165892b6b4d001cbf2eb65c8cd2428b913eff7de1b58b4e4d2afd4c6f96c3.dll
Resource
win10v2004-20220812-en
General
-
Target
143165892b6b4d001cbf2eb65c8cd2428b913eff7de1b58b4e4d2afd4c6f96c3.dll
-
Size
360KB
-
MD5
647a9bb42cf642160a7a831a6aeb5917
-
SHA1
57dbd38973e4038e3206ef102e3c5cb414cb7d9d
-
SHA256
143165892b6b4d001cbf2eb65c8cd2428b913eff7de1b58b4e4d2afd4c6f96c3
-
SHA512
ab2f76a4f7cb39291480409f49a02171967656780ca40034e55b0fbf84afbe35d6cedcf11ad882fb878ef59ba62dcb41972b96970431e46c59d5e44773cf0857
-
SSDEEP
6144:69icMIyfGYf2g9qyYuPKcUub1hURZLL8C6cr7pZ2W0LPFsDRxwvFa:69HPyfnf2u1PKcXxhUecr7/0fF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\143165892b6b4d001cbf2eb65c8cd2428b913eff7de1b58b4e4d2afd4c6f96c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\143165892b6b4d001cbf2eb65c8cd2428b913eff7de1b58b4e4d2afd4c6f96c3.dll,#12⤵PID:1460
-