Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 21:23
Static task
static1
Behavioral task
behavioral1
Sample
3273afab20b916e1de3c65f7ecb3b69d13611843ad82ad9d6e66d6ae3a1e72e2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3273afab20b916e1de3c65f7ecb3b69d13611843ad82ad9d6e66d6ae3a1e72e2.dll
Resource
win10v2004-20220901-en
General
-
Target
3273afab20b916e1de3c65f7ecb3b69d13611843ad82ad9d6e66d6ae3a1e72e2.dll
-
Size
200KB
-
MD5
0c188e3dedc884fedcdde4033254f3e0
-
SHA1
ff3da63129be10d0504aee9552187d1fbb0e508c
-
SHA256
3273afab20b916e1de3c65f7ecb3b69d13611843ad82ad9d6e66d6ae3a1e72e2
-
SHA512
ad19111b377c9587b9598ff8d716b1343b0398da8f524eaea5df9fde198c602e9776217433029fb57965733fe68646449ece880695e3228409ce8cc05cd85bb9
-
SSDEEP
3072:8TiROOF5JnFNZ46J86PtTxlJVT9NFLIuPTt4KWpSoupESEQ2N0BG/AejV7if22Ug:8TiRt5JTZtFLVPTttPySEgBOAihtyb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27 PID 1048 wrote to memory of 1928 1048 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3273afab20b916e1de3c65f7ecb3b69d13611843ad82ad9d6e66d6ae3a1e72e2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3273afab20b916e1de3c65f7ecb3b69d13611843ad82ad9d6e66d6ae3a1e72e2.dll,#12⤵PID:1928
-