Analysis
-
max time kernel
36s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
8efa2e922e60a1b14be30990d9c62821898d119923b1f2893af9276424d11eb3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8efa2e922e60a1b14be30990d9c62821898d119923b1f2893af9276424d11eb3.dll
Resource
win10v2004-20220812-en
General
-
Target
8efa2e922e60a1b14be30990d9c62821898d119923b1f2893af9276424d11eb3.dll
-
Size
6KB
-
MD5
0aacbbd96e56f35d0b920ff8cb567c20
-
SHA1
65f52981d46ae67a380707653cdb0fb614b87eb5
-
SHA256
8efa2e922e60a1b14be30990d9c62821898d119923b1f2893af9276424d11eb3
-
SHA512
cd5626118f71fd27e766c2cdd9d5352277b79de09eb55ce408814c12dc6d8e8893b8ef5a8364bf1c25bfaa8b2c8184f8388eedae8ff6fd5894eb06c44eb07889
-
SSDEEP
96:Ts1Wnnnynnnnnnnn6nnann7nnXnnbnnKniROoqUFjdNOb9FbbbXHt7hZEvHHHE1e:YXN7FnYHNh2vHHHE0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1412 1044 rundll32.exe 27 PID 1044 wrote to memory of 1412 1044 rundll32.exe 27 PID 1044 wrote to memory of 1412 1044 rundll32.exe 27 PID 1044 wrote to memory of 1412 1044 rundll32.exe 27 PID 1044 wrote to memory of 1412 1044 rundll32.exe 27 PID 1044 wrote to memory of 1412 1044 rundll32.exe 27 PID 1044 wrote to memory of 1412 1044 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8efa2e922e60a1b14be30990d9c62821898d119923b1f2893af9276424d11eb3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8efa2e922e60a1b14be30990d9c62821898d119923b1f2893af9276424d11eb3.dll,#12⤵PID:1412
-