Analysis
-
max time kernel
69s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
34347ae8d7682f824bcc794044358fa5105cf6bf845f673e1d70ec4f001e2480.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
34347ae8d7682f824bcc794044358fa5105cf6bf845f673e1d70ec4f001e2480.dll
Resource
win10v2004-20221111-en
General
-
Target
34347ae8d7682f824bcc794044358fa5105cf6bf845f673e1d70ec4f001e2480.dll
-
Size
164KB
-
MD5
447f3640280a70b8c6595a846e2e17c7
-
SHA1
09635f05d71c904ef383b33824f26672e4ad376c
-
SHA256
34347ae8d7682f824bcc794044358fa5105cf6bf845f673e1d70ec4f001e2480
-
SHA512
751264c088375b88151dd7d0633ad37cb8eaca1b25f387e091f20747338f79683083efbded3f366ba5bfe91b721d900fd11d0f7c993a7de13605399f1def48f0
-
SSDEEP
1536:N7Me4OTwIzxofU0AHRvT1R8Aw+5PYl4O0iCI3CfddGFXlcMumVZHAbRP7N1lchpk:FGcxoftqXR1xfiTVcMuiAb9quJO9gL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1060 908 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34347ae8d7682f824bcc794044358fa5105cf6bf845f673e1d70ec4f001e2480.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34347ae8d7682f824bcc794044358fa5105cf6bf845f673e1d70ec4f001e2480.dll,#12⤵PID:1060
-