Analysis
-
max time kernel
27s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 23:54
Behavioral task
behavioral1
Sample
361ee9e1a523bd5d8f9018b02c37f7add268c84ce52d866a18e219d500a2ffea.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
361ee9e1a523bd5d8f9018b02c37f7add268c84ce52d866a18e219d500a2ffea.dll
Resource
win10v2004-20220812-en
General
-
Target
361ee9e1a523bd5d8f9018b02c37f7add268c84ce52d866a18e219d500a2ffea.dll
-
Size
714KB
-
MD5
05f88987150de62ce531e579010cc870
-
SHA1
445ddb01adc2e249284341459f79a48adb4b1aa8
-
SHA256
361ee9e1a523bd5d8f9018b02c37f7add268c84ce52d866a18e219d500a2ffea
-
SHA512
2ba46cbd8f01a49ac8fe5bbb3bc27e2fd35826c91a4b04952b4b0f30ad28bf3a5773a81abd5b78be33b19ea9500f4585b2a80bc44c3e23fd9724198ad93d8b5a
-
SSDEEP
12288:QG4w0TGs8+Doq4ylHZgy47gMYDncykZcTBRrVFKYYcQW55tTdHI1U+v1+iD0t+Hj:306ssM4y47gMYDnMZcLrOapHI1UyESBb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1400-56-0x0000000001FE0000-0x00000000021E4000-memory.dmp vmprotect behavioral1/memory/1400-59-0x0000000001FE0000-0x00000000021E4000-memory.dmp vmprotect behavioral1/memory/1400-60-0x0000000001FE0000-0x00000000021E4000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1400 1192 rundll32.exe 27 PID 1192 wrote to memory of 1400 1192 rundll32.exe 27 PID 1192 wrote to memory of 1400 1192 rundll32.exe 27 PID 1192 wrote to memory of 1400 1192 rundll32.exe 27 PID 1192 wrote to memory of 1400 1192 rundll32.exe 27 PID 1192 wrote to memory of 1400 1192 rundll32.exe 27 PID 1192 wrote to memory of 1400 1192 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\361ee9e1a523bd5d8f9018b02c37f7add268c84ce52d866a18e219d500a2ffea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\361ee9e1a523bd5d8f9018b02c37f7add268c84ce52d866a18e219d500a2ffea.dll,#12⤵PID:1400
-