Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
95db69a1412bee76df8aa07708260ee32780e740501e75707a2ea202d86921ca.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95db69a1412bee76df8aa07708260ee32780e740501e75707a2ea202d86921ca.dll
Resource
win10v2004-20220812-en
General
-
Target
95db69a1412bee76df8aa07708260ee32780e740501e75707a2ea202d86921ca.dll
-
Size
92KB
-
MD5
5d87cf08b052b9b3d435afa3d0d924b7
-
SHA1
97fa2cac1c001b5ffe45d5ba3a365e700b42ed59
-
SHA256
95db69a1412bee76df8aa07708260ee32780e740501e75707a2ea202d86921ca
-
SHA512
e4d9cdb4b8445626b875962b9f06768852303af82a8a0c31406dc7f78dd5ba8b151ff448af9dc69b3911be8954053bd80632d9fd8d2a4c17c6256d0914a544f8
-
SSDEEP
1536:fRmUebiRV0dM05N0nqx1WKkdmLBegV3ktXWzfoDXZ5S+D+kux:ZegVGZ6qgdmLx2xWzfoDJ5ZSx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1260-56-0x0000000000150000-0x000000000015E000-memory.dmp upx behavioral1/memory/1260-59-0x0000000000150000-0x000000000015E000-memory.dmp upx behavioral1/memory/1260-60-0x0000000000150000-0x000000000015E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1260 1364 rundll32.exe 26 PID 1364 wrote to memory of 1260 1364 rundll32.exe 26 PID 1364 wrote to memory of 1260 1364 rundll32.exe 26 PID 1364 wrote to memory of 1260 1364 rundll32.exe 26 PID 1364 wrote to memory of 1260 1364 rundll32.exe 26 PID 1364 wrote to memory of 1260 1364 rundll32.exe 26 PID 1364 wrote to memory of 1260 1364 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95db69a1412bee76df8aa07708260ee32780e740501e75707a2ea202d86921ca.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95db69a1412bee76df8aa07708260ee32780e740501e75707a2ea202d86921ca.dll,#12⤵PID:1260
-