Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
f6139c18bc80998491c09a89642b273b80fa4c0368a07c6ef13b8c36e5cdf688.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f6139c18bc80998491c09a89642b273b80fa4c0368a07c6ef13b8c36e5cdf688.dll
Resource
win10v2004-20221111-en
General
-
Target
f6139c18bc80998491c09a89642b273b80fa4c0368a07c6ef13b8c36e5cdf688.dll
-
Size
84KB
-
MD5
935bf2c72ea6e3aeccac01d91da1845c
-
SHA1
578daedabdc471d4e1832987a2c6f0ac625ec415
-
SHA256
f6139c18bc80998491c09a89642b273b80fa4c0368a07c6ef13b8c36e5cdf688
-
SHA512
be5f07c8b332405ebcaa4795a31af25f963e6762241dad0bbf1e1e3803d2c5051d5946f4314dd45164e86309002e2d1ab64e1665b30edd03192ea8afbaae4b10
-
SSDEEP
1536:WMLgGGjJIFEEDxt0L1t0JA//EEWfKcw84RTJIPHfHi1zUd62:WMLgGGj9EDx+L1t0eHXWfKzrmX6Qd6
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1300 1720 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6139c18bc80998491c09a89642b273b80fa4c0368a07c6ef13b8c36e5cdf688.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6139c18bc80998491c09a89642b273b80fa4c0368a07c6ef13b8c36e5cdf688.dll,#12⤵PID:1300