Analysis
-
max time kernel
27s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 18:59
Behavioral task
behavioral1
Sample
2f670f0ff7e008a53e26a42e02b31316cea2c11930b84e8119ade0a60b7edad5.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f670f0ff7e008a53e26a42e02b31316cea2c11930b84e8119ade0a60b7edad5.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
2f670f0ff7e008a53e26a42e02b31316cea2c11930b84e8119ade0a60b7edad5.dll
-
Size
103KB
-
MD5
82c837a62df8543aeb57ffd4af1b0371
-
SHA1
a93dfc35cd9c5c09b1a0851811a9baed8a02813e
-
SHA256
2f670f0ff7e008a53e26a42e02b31316cea2c11930b84e8119ade0a60b7edad5
-
SHA512
a16f02e8313b6d71faccae1e2e86f33c68e6822d99fecc0a454e82dc2e27a058d791f2ed75142dfbfa740e6843dab40c66f95afa2918b55888fd4c86d0345964
-
SSDEEP
1536:7rOUbmJ/ZS8DDf6Smy1AJcqgtrUDhzDujDkSA2pvn8kfI18V8E1oId:FbmhoODf6hRColzDMh8488n
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 112 wrote to memory of 1204 112 rundll32.exe 28 PID 112 wrote to memory of 1204 112 rundll32.exe 28 PID 112 wrote to memory of 1204 112 rundll32.exe 28 PID 112 wrote to memory of 1204 112 rundll32.exe 28 PID 112 wrote to memory of 1204 112 rundll32.exe 28 PID 112 wrote to memory of 1204 112 rundll32.exe 28 PID 112 wrote to memory of 1204 112 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f670f0ff7e008a53e26a42e02b31316cea2c11930b84e8119ade0a60b7edad5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f670f0ff7e008a53e26a42e02b31316cea2c11930b84e8119ade0a60b7edad5.dll,#12⤵PID:1204
-