Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
25a3353040cdd82058a0a5c7c4c21b83a19498e0128cf8c434c46e0b46eac0f3.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
25a3353040cdd82058a0a5c7c4c21b83a19498e0128cf8c434c46e0b46eac0f3.dll
Resource
win10v2004-20220901-en
General
-
Target
25a3353040cdd82058a0a5c7c4c21b83a19498e0128cf8c434c46e0b46eac0f3.dll
-
Size
78KB
-
MD5
5f3c37518833cac4c086cacc14ce5170
-
SHA1
c011f882d386c303f9244d815e566d3e2ed67012
-
SHA256
25a3353040cdd82058a0a5c7c4c21b83a19498e0128cf8c434c46e0b46eac0f3
-
SHA512
f64d94b37fe762dcc63098b95ae094b51abea8617bab79a41b6b74033dcafe0c998a45c3f3290745ad8090d63e4043603f049c2625101b29986be2b90edf640a
-
SSDEEP
1536:U48JUtZqhxJMD7mrU7go68kn3zccLF9o+gPxfb24MezvLAVlA4Wlg:P8JUt6JE7mrQ6Bjc4F9ojfbHMgDALBkg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1256 1140 rundll32.exe 26 PID 1140 wrote to memory of 1256 1140 rundll32.exe 26 PID 1140 wrote to memory of 1256 1140 rundll32.exe 26 PID 1140 wrote to memory of 1256 1140 rundll32.exe 26 PID 1140 wrote to memory of 1256 1140 rundll32.exe 26 PID 1140 wrote to memory of 1256 1140 rundll32.exe 26 PID 1140 wrote to memory of 1256 1140 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25a3353040cdd82058a0a5c7c4c21b83a19498e0128cf8c434c46e0b46eac0f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25a3353040cdd82058a0a5c7c4c21b83a19498e0128cf8c434c46e0b46eac0f3.dll,#12⤵PID:1256
-