Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
69256958b6e5ee2b31d0e2871d97adea9c72b5716d906a6483a00d8ddc3e5967.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
69256958b6e5ee2b31d0e2871d97adea9c72b5716d906a6483a00d8ddc3e5967.dll
Resource
win10v2004-20220901-en
General
-
Target
69256958b6e5ee2b31d0e2871d97adea9c72b5716d906a6483a00d8ddc3e5967.dll
-
Size
39KB
-
MD5
93977b16355a3596ab931782d2b529a0
-
SHA1
08efc76a14f2b1e07f41d0447be256bb8ae086d1
-
SHA256
69256958b6e5ee2b31d0e2871d97adea9c72b5716d906a6483a00d8ddc3e5967
-
SHA512
41ed376be7ffb70a9674f6e069da74e981f1bafacf94da9744508bf1236276234ca5c2774c601a1a51ac6e3b9e4425f7a48291aadd0b1604bd1b34db5bb5c5be
-
SSDEEP
768:S9ih5gqYXxei9ovwgnVXObaIkZXBNvLEPiySVj4seizqQ:SiiXVUDVXOb4ZXBN3leizf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2016 2032 rundll32.exe 27 PID 2032 wrote to memory of 2016 2032 rundll32.exe 27 PID 2032 wrote to memory of 2016 2032 rundll32.exe 27 PID 2032 wrote to memory of 2016 2032 rundll32.exe 27 PID 2032 wrote to memory of 2016 2032 rundll32.exe 27 PID 2032 wrote to memory of 2016 2032 rundll32.exe 27 PID 2032 wrote to memory of 2016 2032 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69256958b6e5ee2b31d0e2871d97adea9c72b5716d906a6483a00d8ddc3e5967.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69256958b6e5ee2b31d0e2871d97adea9c72b5716d906a6483a00d8ddc3e5967.dll,#12⤵PID:2016
-