Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
02e23cde1af51d3140562a7103c6625d883d683f3cfb1e708ab44a86dad711df.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02e23cde1af51d3140562a7103c6625d883d683f3cfb1e708ab44a86dad711df.dll
Resource
win10v2004-20220901-en
General
-
Target
02e23cde1af51d3140562a7103c6625d883d683f3cfb1e708ab44a86dad711df.dll
-
Size
305KB
-
MD5
25abb04060efc598bddd090331de0c0b
-
SHA1
aebd68c67e537e3424fb1b3736c15e29bd4d18e3
-
SHA256
02e23cde1af51d3140562a7103c6625d883d683f3cfb1e708ab44a86dad711df
-
SHA512
f91ce4543360dbc9399d9d53503c02f1e5bd52f112f23d21f9e3ce0b607cf70585418cf773718d69ed13d7c9d6e5c45cb84bc4626adb45ea2abce8562ca7e64f
-
SSDEEP
6144:68lIoGb0qBju1du5aBLmn5oddddpxhdddjMIhNddrbdddkOueddQdudF45PW:6k0b0qBmCW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02e23cde1af51d3140562a7103c6625d883d683f3cfb1e708ab44a86dad711df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02e23cde1af51d3140562a7103c6625d883d683f3cfb1e708ab44a86dad711df.dll,#12⤵PID:1116
-