Analysis
-
max time kernel
19s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll
Resource
win10v2004-20220812-en
General
-
Target
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll
-
Size
460KB
-
MD5
beae4d36b224b8a1ee61e4f9dc4151cf
-
SHA1
2780fc238cd0eb2d10eefa8bb639f6c589123984
-
SHA256
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8
-
SHA512
ae80e3a12379de68707f7f60c653af8ea73910d259cd326c5ef2b118f441c7604016786c7dbdbb26f5ab2ca68998c8f3389354e07eee90539e323902fccd5a9e
-
SSDEEP
6144:uyolGpyTm5X7UKCns9rsKGLNW1opnmavXwlkJBgl0GQOeHvCpnVVjX7WKMYuEmw:ul4yMvINxMiFvwl03FHETjX7MY5mw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1388 1652 rundll32.exe 14 PID 1652 wrote to memory of 1388 1652 rundll32.exe 14 PID 1652 wrote to memory of 1388 1652 rundll32.exe 14 PID 1652 wrote to memory of 1388 1652 rundll32.exe 14 PID 1652 wrote to memory of 1388 1652 rundll32.exe 14 PID 1652 wrote to memory of 1388 1652 rundll32.exe 14 PID 1652 wrote to memory of 1388 1652 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll,#11⤵PID:1388
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:1444
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵PID:1728
-