Analysis
-
max time kernel
19s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:49
Static task
static1
Behavioral task
behavioral1
Sample
9256bb50088c03ee383ee8250e9887ccd8c638df1dab81553e8c894a58a1a622.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9256bb50088c03ee383ee8250e9887ccd8c638df1dab81553e8c894a58a1a622.dll
Resource
win10v2004-20221111-en
General
-
Target
9256bb50088c03ee383ee8250e9887ccd8c638df1dab81553e8c894a58a1a622.dll
-
Size
724KB
-
MD5
4381595133f89781e09f9f253cd0c680
-
SHA1
29e82c4a08a55b084e08a01c711f2354f8538617
-
SHA256
9256bb50088c03ee383ee8250e9887ccd8c638df1dab81553e8c894a58a1a622
-
SHA512
785c026f4102d564837557d11ad1adeab178ff25fecf6a5473902707d9ff2dcedee0d38bc23d75e79f57f24d845680aaca5647b3762622c7c65660e9a290edac
-
SSDEEP
12288:aT7JBmznQYkRcIiLyyrcRsix7mRHIpL5IPvchXGM+36Yw/4Xgr8KecVWtzKPdSJD:aT7JBmzn8cIiLyyrcKipmRHIpL5IPvca
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2036 1744 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9256bb50088c03ee383ee8250e9887ccd8c638df1dab81553e8c894a58a1a622.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9256bb50088c03ee383ee8250e9887ccd8c638df1dab81553e8c894a58a1a622.dll,#12⤵PID:2036