Analysis
-
max time kernel
86s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:14
Static task
static1
Behavioral task
behavioral1
Sample
e388c184971d3c4fbfad785ad6e6c9395f75f9f5eb16bb88bb1362d13753958f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e388c184971d3c4fbfad785ad6e6c9395f75f9f5eb16bb88bb1362d13753958f.dll
Resource
win10v2004-20220901-en
General
-
Target
e388c184971d3c4fbfad785ad6e6c9395f75f9f5eb16bb88bb1362d13753958f.dll
-
Size
10KB
-
MD5
15a3711c465ec7ae5938ea82f3468ff7
-
SHA1
a32303df3b54854f30dd50d44ce3896f4de3b0ad
-
SHA256
e388c184971d3c4fbfad785ad6e6c9395f75f9f5eb16bb88bb1362d13753958f
-
SHA512
3fff257ac60ac02fdaae730898bd306d7b478748b4cbffa45c3ad220943c7bb33fb1f9886435208bc209b34bb215bf3a680fc4adaf9e11c0cdbb7d6a8b268ef7
-
SSDEEP
192:Sw8dHabRDEgtHyl0NSypWak6HVdW3yWak8QjdW3w92b:6dHad/N20IypWak8dWiWak8EdW7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe PID 1500 wrote to memory of 360 1500 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e388c184971d3c4fbfad785ad6e6c9395f75f9f5eb16bb88bb1362d13753958f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e388c184971d3c4fbfad785ad6e6c9395f75f9f5eb16bb88bb1362d13753958f.dll,#12⤵PID:360