Analysis
-
max time kernel
22s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
731836e4a99af6d46420b5ed92b95b32cc4ad6a1e2f64c2d25447834cfcece0b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
731836e4a99af6d46420b5ed92b95b32cc4ad6a1e2f64c2d25447834cfcece0b.dll
Resource
win10v2004-20220812-en
General
-
Target
731836e4a99af6d46420b5ed92b95b32cc4ad6a1e2f64c2d25447834cfcece0b.dll
-
Size
51KB
-
MD5
8477dec51a4c6632993643b6a1a082e6
-
SHA1
d43866e174600de83530745f04c3bf7d22b38e3f
-
SHA256
731836e4a99af6d46420b5ed92b95b32cc4ad6a1e2f64c2d25447834cfcece0b
-
SHA512
3b9e03de4bf65cf6177938fb36a03a5cc033eb1d155ded61cea89c5bcaa78a9d2c0d2a44e280b02ab9e6241ecce23ef356dd55d17c37af09b6f4389f623f622c
-
SSDEEP
768:aL0iaHYQE4/flxDOx+YYMQMOw2dk3HVJODta1V99pq0z4:O0iUYc/XDOxiP2b3Vqwl65
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1904 1948 rundll32.exe 27 PID 1948 wrote to memory of 1904 1948 rundll32.exe 27 PID 1948 wrote to memory of 1904 1948 rundll32.exe 27 PID 1948 wrote to memory of 1904 1948 rundll32.exe 27 PID 1948 wrote to memory of 1904 1948 rundll32.exe 27 PID 1948 wrote to memory of 1904 1948 rundll32.exe 27 PID 1948 wrote to memory of 1904 1948 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\731836e4a99af6d46420b5ed92b95b32cc4ad6a1e2f64c2d25447834cfcece0b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\731836e4a99af6d46420b5ed92b95b32cc4ad6a1e2f64c2d25447834cfcece0b.dll,#12⤵PID:1904
-