Analysis
-
max time kernel
41s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll
Resource
win10v2004-20220812-en
General
-
Target
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll
-
Size
37KB
-
MD5
8728fd583ebd5f8e493472bd9d3e8b8a
-
SHA1
cdf134f9ab3dcde85bcfaf686f45633933aea148
-
SHA256
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079
-
SHA512
21e1eb2991bebb800fdd981ffe3579ce32368a5e6045a0e04fd212294b22304e18b4a2b18145837aecff2077ee57e2d744e8bd47dcef4432fc1948ba2c7d861d
-
SSDEEP
768:z1raN5iQHRwYsBOETOUjet/Ijng2yLCXQMz:ZWN5iQHRkBFqb/IjP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1964 1984 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll,#12⤵PID:1964