Analysis
-
max time kernel
162s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:25
Static task
static1
Behavioral task
behavioral1
Sample
f731b25c32963507d307255237d4c52095c5714ef15cdcf6f923bb47d717e95f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f731b25c32963507d307255237d4c52095c5714ef15cdcf6f923bb47d717e95f.dll
Resource
win10v2004-20221111-en
General
-
Target
f731b25c32963507d307255237d4c52095c5714ef15cdcf6f923bb47d717e95f.dll
-
Size
505KB
-
MD5
9af6a92f064dfdd90dc0956be84f6df5
-
SHA1
9a0283c74a50b0c7d2107e1a89570e410a9b9ed6
-
SHA256
8a3be3a2745aff80ef88049a8cfc758ed05d54d62b236236aad0cee11bfc35fc
-
SHA512
0b1b1b9f08c773c503e3b4a2df523b55cf9634fdcd054de1262aece00490045bce66188864132e5c6730bca3adc6e527d3c3c23c5939b8edcb2cb8e3a1a5ca0e
-
SSDEEP
6144:RXX8qk+7206ViSn9hagxr1nIJ03ggHdhs9xCeeOM:R8qVi+saa6J+ggHbsbeOM
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 2 1360 rundll32.exe 3 1360 rundll32.exe 4 1360 rundll32.exe 5 1360 rundll32.exe 6 1360 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe PID 1356 wrote to memory of 1360 1356 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f731b25c32963507d307255237d4c52095c5714ef15cdcf6f923bb47d717e95f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f731b25c32963507d307255237d4c52095c5714ef15cdcf6f923bb47d717e95f.dll,#12⤵
- Blocklisted process makes network request
PID:1360