Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
a65fd0de656b4104f9e44bc0f35c7a0a46c520ec39d98ada0fae0e724720ab35.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a65fd0de656b4104f9e44bc0f35c7a0a46c520ec39d98ada0fae0e724720ab35.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
a65fd0de656b4104f9e44bc0f35c7a0a46c520ec39d98ada0fae0e724720ab35.dll
-
Size
116KB
-
MD5
f0dbc658d501a6f7f9874ef417b0d3db
-
SHA1
c74f43c5a9e841286f7286049827b36c042c27b0
-
SHA256
a65fd0de656b4104f9e44bc0f35c7a0a46c520ec39d98ada0fae0e724720ab35
-
SHA512
3959225670fcc81b59d3f466e848640c2d8df940a747301e5736ee2b6bd9d89fb40f6028096e52d1c81ab63adeef38b9ef3c7a2f1dff23b8d7fe371b6e6d5f93
-
SSDEEP
3072:dXfCqFcBb/VYAGNxAEOeOxQ30tgS2Enb:dXZ6xVD7
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 112 wrote to memory of 1472 112 rundll32.exe 27 PID 112 wrote to memory of 1472 112 rundll32.exe 27 PID 112 wrote to memory of 1472 112 rundll32.exe 27 PID 112 wrote to memory of 1472 112 rundll32.exe 27 PID 112 wrote to memory of 1472 112 rundll32.exe 27 PID 112 wrote to memory of 1472 112 rundll32.exe 27 PID 112 wrote to memory of 1472 112 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a65fd0de656b4104f9e44bc0f35c7a0a46c520ec39d98ada0fae0e724720ab35.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a65fd0de656b4104f9e44bc0f35c7a0a46c520ec39d98ada0fae0e724720ab35.dll,#12⤵PID:1472
-