Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
7e009c351b21f6700c2078ea004417501fa3b22cb2ce536dd9569c0d35a45360.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e009c351b21f6700c2078ea004417501fa3b22cb2ce536dd9569c0d35a45360.dll
Resource
win10v2004-20221111-en
General
-
Target
7e009c351b21f6700c2078ea004417501fa3b22cb2ce536dd9569c0d35a45360.dll
-
Size
274KB
-
MD5
346730a882a5963da5e9ecbdee5616e3
-
SHA1
fb2b836fed15ddcf1b4d67c107b3881fddb527ed
-
SHA256
7e009c351b21f6700c2078ea004417501fa3b22cb2ce536dd9569c0d35a45360
-
SHA512
9b9997adc3396fb2e85f449461a91cb56669c4f45f88cb82f2600f46c57d164bd500515e6234870a3a9114c9010a04d566852e79ca063e3c9f9f9155f29d35d5
-
SSDEEP
6144:IOSjIXo9jPDv5eisvDs8W7s9ZuJrUO//oOqzTzlUK/zNFe5kQn:3549zDUis7s8W7GYAOqWAMiQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1252 1144 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e009c351b21f6700c2078ea004417501fa3b22cb2ce536dd9569c0d35a45360.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e009c351b21f6700c2078ea004417501fa3b22cb2ce536dd9569c0d35a45360.dll,#12⤵PID:1252