Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll
Resource
win10v2004-20220812-en
General
-
Target
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll
-
Size
37KB
-
MD5
8728fd583ebd5f8e493472bd9d3e8b8a
-
SHA1
cdf134f9ab3dcde85bcfaf686f45633933aea148
-
SHA256
7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079
-
SHA512
21e1eb2991bebb800fdd981ffe3579ce32368a5e6045a0e04fd212294b22304e18b4a2b18145837aecff2077ee57e2d744e8bd47dcef4432fc1948ba2c7d861d
-
SSDEEP
768:z1raN5iQHRwYsBOETOUjet/Ijng2yLCXQMz:ZWN5iQHRkBFqb/IjP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4112 wrote to memory of 2688 4112 rundll32.exe rundll32.exe PID 4112 wrote to memory of 2688 4112 rundll32.exe rundll32.exe PID 4112 wrote to memory of 2688 4112 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e5d6b471e97176fd3df7f102d045d7c740e13fe08b260dbb8106521775f1079.dll,#12⤵PID:2688