Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
2e756c7b671fd352619e7e4dd6ab7382f9f5c403fe8d535c0cad9d36de8c8d8a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e756c7b671fd352619e7e4dd6ab7382f9f5c403fe8d535c0cad9d36de8c8d8a.dll
Resource
win10v2004-20220812-en
General
-
Target
2e756c7b671fd352619e7e4dd6ab7382f9f5c403fe8d535c0cad9d36de8c8d8a.dll
-
Size
92KB
-
MD5
0e52f58a1df3d9371b8461024b883294
-
SHA1
9e8165f51c8e56e7ba5b2dc72c85d275693ad422
-
SHA256
2e756c7b671fd352619e7e4dd6ab7382f9f5c403fe8d535c0cad9d36de8c8d8a
-
SHA512
c3cd5bcbb4999daf0ac643f38332bd85bc620a75f7263b057a6fd8b36429bfd576fbe2c110abd362d5ae5d50ed8a9fbfa41710c4a70f7222a629c62cf2d579d9
-
SSDEEP
1536:DvjI3ozC4xqvdSRt43p768LoWYlRMZHRWnBoSHsNdVbFP5gMlfi:HI3CCvQape8LoWYl2Zxg+b9xlfi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1280 1260 rundll32.exe 27 PID 1260 wrote to memory of 1280 1260 rundll32.exe 27 PID 1260 wrote to memory of 1280 1260 rundll32.exe 27 PID 1260 wrote to memory of 1280 1260 rundll32.exe 27 PID 1260 wrote to memory of 1280 1260 rundll32.exe 27 PID 1260 wrote to memory of 1280 1260 rundll32.exe 27 PID 1260 wrote to memory of 1280 1260 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e756c7b671fd352619e7e4dd6ab7382f9f5c403fe8d535c0cad9d36de8c8d8a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e756c7b671fd352619e7e4dd6ab7382f9f5c403fe8d535c0cad9d36de8c8d8a.dll,#12⤵PID:1280
-