Analysis
-
max time kernel
23s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:37
Static task
static1
Behavioral task
behavioral1
Sample
71d446dd58a2d101996c19f1966c8fec6b1c810a60b694d10199eba518120ad3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71d446dd58a2d101996c19f1966c8fec6b1c810a60b694d10199eba518120ad3.dll
Resource
win10v2004-20220812-en
General
-
Target
71d446dd58a2d101996c19f1966c8fec6b1c810a60b694d10199eba518120ad3.dll
-
Size
20KB
-
MD5
51896f7d418ca5e740c77efa53a94579
-
SHA1
132420b8b6fdea0d8df368bf1ca75d471e7f5084
-
SHA256
71d446dd58a2d101996c19f1966c8fec6b1c810a60b694d10199eba518120ad3
-
SHA512
2a3151dcec857776b70b610e641d3c0752101275f3d65351ca3a647b62bec87cf66eede6ef36c3ffd2aac5d3ff67fc8c09e553f43a4ec565d0bc9bc1b284e28d
-
SSDEEP
384:iyGhOtowkA1oqAq6IVdzagi3emzSIXRIVQt3Lceh9Ce6L/gJBb5UYDB3PxJXoCXc:ivISAOq9FSrNRMQt3Lceh9Ce6L/gJBb0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1056 1952 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71d446dd58a2d101996c19f1966c8fec6b1c810a60b694d10199eba518120ad3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71d446dd58a2d101996c19f1966c8fec6b1c810a60b694d10199eba518120ad3.dll,#12⤵PID:1056