Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
3984236c1cb4fd6976840946cfae424b69c6345714ee99deae2dff75583787fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3984236c1cb4fd6976840946cfae424b69c6345714ee99deae2dff75583787fa.dll
Resource
win10v2004-20220812-en
General
-
Target
3984236c1cb4fd6976840946cfae424b69c6345714ee99deae2dff75583787fa.dll
-
Size
186KB
-
MD5
94eea943f35df0b59477825210e21d9e
-
SHA1
1c936b6fc359cdd7dd5d8f93652e7b8dd468d46e
-
SHA256
3984236c1cb4fd6976840946cfae424b69c6345714ee99deae2dff75583787fa
-
SHA512
f125c1101de54394887c7f13dfb06d538a5ef7e7e4136cbd7b38b63ae4e4c813b30c58517d6dc3dfb2aa584680df114bad78283767c58dc99ae7953c65c6c26a
-
SSDEEP
3072:wnhMMckC7W2oHLu+B2AHAsDImVe0ucjzkBeM/RFCh+Rz7NdO3rJRWljmlnKrs4HH:wKWCq2oHLuQHAsDRVjJEX/RFCh+Rz7Ny
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1636 1268 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3984236c1cb4fd6976840946cfae424b69c6345714ee99deae2dff75583787fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3984236c1cb4fd6976840946cfae424b69c6345714ee99deae2dff75583787fa.dll,#12⤵PID:1636