Analysis
-
max time kernel
18s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:41
Static task
static1
Behavioral task
behavioral1
Sample
258a9a45189300657c9d7ae4bfa19381b1a8afb262c9c93554ef53f2a1af9281.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
258a9a45189300657c9d7ae4bfa19381b1a8afb262c9c93554ef53f2a1af9281.dll
Resource
win10v2004-20220812-en
General
-
Target
258a9a45189300657c9d7ae4bfa19381b1a8afb262c9c93554ef53f2a1af9281.dll
-
Size
172KB
-
MD5
3598e834525fb8996e3107a13eeb129b
-
SHA1
75861055d90861e1182ca22aa3a306f1fcaa8439
-
SHA256
258a9a45189300657c9d7ae4bfa19381b1a8afb262c9c93554ef53f2a1af9281
-
SHA512
2b85351ecc1aa449b53c727da3f9fb0aa71d40efb9bc4f55b8aa0e6b308f489771378dd681181f6f0222655e65725a1c252c60a5ef3988da527368ea3dc54efc
-
SSDEEP
3072:TUj9pz1thi8FgocXWj0VOpb565oXEfF2Kpfu+ni7rsaImVDYdVw4:wbYhocXWjYk5H0YArYgp/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe PID 336 wrote to memory of 1120 336 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\258a9a45189300657c9d7ae4bfa19381b1a8afb262c9c93554ef53f2a1af9281.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\258a9a45189300657c9d7ae4bfa19381b1a8afb262c9c93554ef53f2a1af9281.dll,#12⤵PID:1120
-