Analysis
-
max time kernel
97s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
9c24acae2c190753884f59b5bb4669083442e768ecbb8b9db67b22e851afcdb4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9c24acae2c190753884f59b5bb4669083442e768ecbb8b9db67b22e851afcdb4.dll
Resource
win10v2004-20221111-en
General
-
Target
9c24acae2c190753884f59b5bb4669083442e768ecbb8b9db67b22e851afcdb4.dll
-
Size
111KB
-
MD5
4888dee3ef9e81e271b141ffc95409f8
-
SHA1
439de76ea6fae8671679723eae2157274437ee0b
-
SHA256
9c24acae2c190753884f59b5bb4669083442e768ecbb8b9db67b22e851afcdb4
-
SHA512
4548942300da6eae98713bd3cc04bb7a8d4d3337675150fc14056cfa5abe76dd7f8ccc7677151aa5a2b34788bf185cdbc1120dc1de9c0198791123d4f6990e77
-
SSDEEP
3072:T+zLxz0UGkCLz1q6oJL3XvXjH/JG6qO9GS8yarrYpB:MLz+Lz1kJL3fXjHRG6/9GTyA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2024 2044 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c24acae2c190753884f59b5bb4669083442e768ecbb8b9db67b22e851afcdb4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c24acae2c190753884f59b5bb4669083442e768ecbb8b9db67b22e851afcdb4.dll,#12⤵PID:2024