Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
2ce2784a00eeea1077a235e92b92fca1cf45021d2b567e555b0df994447a93fd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ce2784a00eeea1077a235e92b92fca1cf45021d2b567e555b0df994447a93fd.dll
Resource
win10v2004-20220812-en
General
-
Target
2ce2784a00eeea1077a235e92b92fca1cf45021d2b567e555b0df994447a93fd.dll
-
Size
6KB
-
MD5
0acf7830d7fb9dafd5adaffc85f64444
-
SHA1
e6b2cad85ce5a3f1b8d063965a1b547838587c25
-
SHA256
2ce2784a00eeea1077a235e92b92fca1cf45021d2b567e555b0df994447a93fd
-
SHA512
6c69bf5f01ff9a896cbb90896650a7c522b31b26752e16e2e65ee2a6bb38823fca881d0069c99945fd3b3f750148dd3466d1ac2a446bd14188bbe5a6c9ec45b6
-
SSDEEP
96:nEY2RrF1eqwi4mIi9Grr4HzX2P/0Ewdh+RB8ay6qVr9z2//9ypnvTEU0:EHRh1eppQGrr4TXpdvJ6C8/kpg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ce2784a00eeea1077a235e92b92fca1cf45021d2b567e555b0df994447a93fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ce2784a00eeea1077a235e92b92fca1cf45021d2b567e555b0df994447a93fd.dll,#12⤵PID:1644
-