Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
627f5c790d15d436e7d4b3c55b1a64c9cf3433af4f201a155d40ee2f04c11e2d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
627f5c790d15d436e7d4b3c55b1a64c9cf3433af4f201a155d40ee2f04c11e2d.dll
Resource
win10v2004-20220901-en
General
-
Target
627f5c790d15d436e7d4b3c55b1a64c9cf3433af4f201a155d40ee2f04c11e2d.dll
-
Size
308KB
-
MD5
bdfe7e3192ffe3df854304a27ba474fa
-
SHA1
7b7a07a66c6d09109a90432fcf8f9877cd6d92f4
-
SHA256
627f5c790d15d436e7d4b3c55b1a64c9cf3433af4f201a155d40ee2f04c11e2d
-
SHA512
7acf9a590e10ee3db24b6b7b78c7e7eabb835958b2d1cf063783f8740da23fc534c5fc51fe14983918292ac3edf2fd974a98f3aa72439fdd910428a6c3c550a5
-
SSDEEP
6144:sA27vyk1HKINRJfEpzbZRNOycpAoVSyesi06:sAEH5spXZTzcpAo8p0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 856 1388 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\627f5c790d15d436e7d4b3c55b1a64c9cf3433af4f201a155d40ee2f04c11e2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\627f5c790d15d436e7d4b3c55b1a64c9cf3433af4f201a155d40ee2f04c11e2d.dll,#12⤵