Analysis
-
max time kernel
11s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 17:33
Static task
static1
Behavioral task
behavioral1
Sample
6bf8bb4a0a4e27482d6c4a97dbb2430be5e887b6703378be485cc168ba53326e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6bf8bb4a0a4e27482d6c4a97dbb2430be5e887b6703378be485cc168ba53326e.dll
Resource
win10v2004-20220812-en
General
-
Target
6bf8bb4a0a4e27482d6c4a97dbb2430be5e887b6703378be485cc168ba53326e.dll
-
Size
692KB
-
MD5
8510a055c905370d30adec4e7a3c6270
-
SHA1
b27027bddbcaa6978809d6779a42905d51e1aae6
-
SHA256
6bf8bb4a0a4e27482d6c4a97dbb2430be5e887b6703378be485cc168ba53326e
-
SHA512
60ed2f6386bed3ce67bf673c3ebe9867031b4fe06a1d9e34a0d9305e298d8494b419833ac6943dcf3abf4b4a8b1dd1d664b9b8149a17e308a1ee7fd668f2cbfd
-
SSDEEP
12288:oD6/eg58EEPEec/027NGqcDrbQUw31/KyLaM+QJt7/OboCDVyJ1tW0Y50QdQX:5yEXwoayJ17YOX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 896 wrote to memory of 2016 896 rundll32.exe 28 PID 896 wrote to memory of 2016 896 rundll32.exe 28 PID 896 wrote to memory of 2016 896 rundll32.exe 28 PID 896 wrote to memory of 2016 896 rundll32.exe 28 PID 896 wrote to memory of 2016 896 rundll32.exe 28 PID 896 wrote to memory of 2016 896 rundll32.exe 28 PID 896 wrote to memory of 2016 896 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf8bb4a0a4e27482d6c4a97dbb2430be5e887b6703378be485cc168ba53326e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf8bb4a0a4e27482d6c4a97dbb2430be5e887b6703378be485cc168ba53326e.dll,#12⤵PID:2016
-