Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
a6d892541b548e66ae973513dfccfa42a7f06c0b5ad118f2756f30c20b4096bb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6d892541b548e66ae973513dfccfa42a7f06c0b5ad118f2756f30c20b4096bb.dll
Resource
win10v2004-20220812-en
General
-
Target
a6d892541b548e66ae973513dfccfa42a7f06c0b5ad118f2756f30c20b4096bb.dll
-
Size
409KB
-
MD5
92680cafee9c06a54b7aeb656b446f60
-
SHA1
b2975cd1072855378b40bc48981cb68c5d0f395c
-
SHA256
a6d892541b548e66ae973513dfccfa42a7f06c0b5ad118f2756f30c20b4096bb
-
SHA512
2bd5a53e664942e42f29f41ff716736df7324f2daaa569a4ce8f799c0847a33dc8b0d0bf9d9562adc61a5c9cb4ea5f08201c158cc9d568456e1935798416958e
-
SSDEEP
6144:jC4CqlHNQ3KlFbU9uBf1q4WdJougv/SjCI8MOOnlZA+3DlJl0EnYwRS6qi+D9dfA:pCmtQ3KvbNI7Lp+PXLKZRQcYM
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d892541b548e66ae973513dfccfa42a7f06c0b5ad118f2756f30c20b4096bb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d892541b548e66ae973513dfccfa42a7f06c0b5ad118f2756f30c20b4096bb.dll,#12⤵PID:532
-