Analysis
-
max time kernel
112s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
7d57baefc84ea214656bf4f47ab3e48fd9efcc3f7513de1869dc7bed8f55bd1a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d57baefc84ea214656bf4f47ab3e48fd9efcc3f7513de1869dc7bed8f55bd1a.dll
Resource
win10v2004-20220812-en
General
-
Target
7d57baefc84ea214656bf4f47ab3e48fd9efcc3f7513de1869dc7bed8f55bd1a.dll
-
Size
4KB
-
MD5
922fee42feda8a7625dbf306160318d8
-
SHA1
92d35ba09ee98bbcfa3116081fd25e31bf9617df
-
SHA256
7d57baefc84ea214656bf4f47ab3e48fd9efcc3f7513de1869dc7bed8f55bd1a
-
SHA512
8e321e7e37193f7e696b809cdb11c1715d48f5018b3a0fc6873dd20639d761c7ffbcb38e5d72e09366b7bab3f7a9133e686bf38161f2bd4fd0067294f7d46e2c
-
SSDEEP
48:a5zdM1cSTBg0r27vTuAEKrVOuP2R8bQZcM4v66IcUYq:PT3r2vu9JuPNbQWM4vvIcUYq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 1268 4024 rundll32.exe 78 PID 4024 wrote to memory of 1268 4024 rundll32.exe 78 PID 4024 wrote to memory of 1268 4024 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d57baefc84ea214656bf4f47ab3e48fd9efcc3f7513de1869dc7bed8f55bd1a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d57baefc84ea214656bf4f47ab3e48fd9efcc3f7513de1869dc7bed8f55bd1a.dll,#12⤵PID:1268
-