Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:10
Static task
static1
Behavioral task
behavioral1
Sample
0755a5afd1c913cd0b1a618b532c4b8f08898b4b4f274e34beceeaed293a26b5.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0755a5afd1c913cd0b1a618b532c4b8f08898b4b4f274e34beceeaed293a26b5.dll
Resource
win10v2004-20221111-en
General
-
Target
0755a5afd1c913cd0b1a618b532c4b8f08898b4b4f274e34beceeaed293a26b5.dll
-
Size
139KB
-
MD5
534975bf3f367ed7bdba85035b8f0e68
-
SHA1
5816f07ebbcc1a750d9296816b9b516914ce29e2
-
SHA256
0755a5afd1c913cd0b1a618b532c4b8f08898b4b4f274e34beceeaed293a26b5
-
SHA512
89e5ce2aff29543bc5bc9ac1dca0f954e4f3001de367fa2db5e81fee273a513ae25e9d03aad45e73d2d47f4df4099de9bcbc23c834df412a4e7e7c415db208f9
-
SSDEEP
3072:VmYMwx6thR8laweyF6QGMa0D0RIsovDG0xwga61Q5:VmK2hR7ypHDjB7GUww+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1892 2028 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0755a5afd1c913cd0b1a618b532c4b8f08898b4b4f274e34beceeaed293a26b5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0755a5afd1c913cd0b1a618b532c4b8f08898b4b4f274e34beceeaed293a26b5.dll,#12⤵PID:1892