Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 10:10
Behavioral task
behavioral1
Sample
d7f9ad4c048f8eb1a3383eaa2e2674ca71501e81a7b285a8effdb6dff33f4eb3.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d7f9ad4c048f8eb1a3383eaa2e2674ca71501e81a7b285a8effdb6dff33f4eb3.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
d7f9ad4c048f8eb1a3383eaa2e2674ca71501e81a7b285a8effdb6dff33f4eb3.dll
-
Size
63KB
-
MD5
0d4f3014e1f153634b904fbcdde99d20
-
SHA1
d26de2cb132b1ec8410f8f9f56fb52326bf8baac
-
SHA256
d7f9ad4c048f8eb1a3383eaa2e2674ca71501e81a7b285a8effdb6dff33f4eb3
-
SHA512
b480c494599e10ac9ca50a60683fd4618e62460fc2d206d0398f6749086d259e918e848a74ebbfdfacfb5e8d330f0ae3b616028e28712eb465199d1d1ccce069
-
SSDEEP
1536:9fQmmcxs2AqMzqbHsPFecOKwbX4klxTwU:W4AqMz6OFecOKwnxf
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7f9ad4c048f8eb1a3383eaa2e2674ca71501e81a7b285a8effdb6dff33f4eb3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7f9ad4c048f8eb1a3383eaa2e2674ca71501e81a7b285a8effdb6dff33f4eb3.dll,#12⤵PID:1376
-