Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
b94c1892c5c3d7c4845a48deb0cc44f89245856a0b88c1de24ff4529aadafe64.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b94c1892c5c3d7c4845a48deb0cc44f89245856a0b88c1de24ff4529aadafe64.dll
Resource
win10v2004-20220812-en
General
-
Target
b94c1892c5c3d7c4845a48deb0cc44f89245856a0b88c1de24ff4529aadafe64.dll
-
Size
238KB
-
MD5
84fe29789bb68125106f5bee7b89b080
-
SHA1
f513aeb564f7627a5ebdaf5a4a39f70e96510229
-
SHA256
b94c1892c5c3d7c4845a48deb0cc44f89245856a0b88c1de24ff4529aadafe64
-
SHA512
881407c7dd1421de0fbd0d9602b6742daf1b3b99518714a9ea0be890d5821a7479a0601eee993bf8bdd103d897efd713b1bb7839f57d1d2ef3e4b06b26b2db5b
-
SSDEEP
1536:sSgI0g5rDIhr4g/IAe9oWU7uS2f9SSEMtZLlqROx9pq8ml9We:q6g4g4jS2f9SSE0hy8Q9We
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b94c1892c5c3d7c4845a48deb0cc44f89245856a0b88c1de24ff4529aadafe64.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b94c1892c5c3d7c4845a48deb0cc44f89245856a0b88c1de24ff4529aadafe64.dll,#12⤵PID:1300
-