Analysis
-
max time kernel
36s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 18:50
Static task
static1
Behavioral task
behavioral1
Sample
753f359d08bf58e08834d45cfcaaf3a29d5c864c3b3f5a4ed8b3f96caf02a373.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
753f359d08bf58e08834d45cfcaaf3a29d5c864c3b3f5a4ed8b3f96caf02a373.dll
Resource
win10v2004-20220901-en
General
-
Target
753f359d08bf58e08834d45cfcaaf3a29d5c864c3b3f5a4ed8b3f96caf02a373.dll
-
Size
124KB
-
MD5
5108cafb5750aac2aa72c98c441dd150
-
SHA1
52cced4396fd232c9fe766d117cba7959253a72d
-
SHA256
753f359d08bf58e08834d45cfcaaf3a29d5c864c3b3f5a4ed8b3f96caf02a373
-
SHA512
02bdf50776b3544d334332173d274e0b76fad91ff226c3a21cce27bd5cabb4bba773cd9fb0ed7964ecf072d2ef0db3df5e6e9bdb416600a61c484db247ad4357
-
SSDEEP
3072:rxBTCCNrVphFi0+Ry0BV5JFPQ+L/vHgQFmyDfhfaW:r/rP7i0YX++L/fg2FA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2028 1872 rundll32.exe 27 PID 1872 wrote to memory of 2028 1872 rundll32.exe 27 PID 1872 wrote to memory of 2028 1872 rundll32.exe 27 PID 1872 wrote to memory of 2028 1872 rundll32.exe 27 PID 1872 wrote to memory of 2028 1872 rundll32.exe 27 PID 1872 wrote to memory of 2028 1872 rundll32.exe 27 PID 1872 wrote to memory of 2028 1872 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\753f359d08bf58e08834d45cfcaaf3a29d5c864c3b3f5a4ed8b3f96caf02a373.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\753f359d08bf58e08834d45cfcaaf3a29d5c864c3b3f5a4ed8b3f96caf02a373.dll,#12⤵PID:2028
-