Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
ada0a586036272bd3006a3235ae8d9731c3fdf8259a7b8183fe92af3897b7d77.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ada0a586036272bd3006a3235ae8d9731c3fdf8259a7b8183fe92af3897b7d77.dll
Resource
win10v2004-20221111-en
General
-
Target
ada0a586036272bd3006a3235ae8d9731c3fdf8259a7b8183fe92af3897b7d77.dll
-
Size
60KB
-
MD5
5a9e67d430a8bb6a7fa9f4dc0860b655
-
SHA1
33d6d2f0ccb4bf82afcccd7fa0b7a69dc1526670
-
SHA256
ada0a586036272bd3006a3235ae8d9731c3fdf8259a7b8183fe92af3897b7d77
-
SHA512
240c4bdd8d329feb3530479d58c69cec17d26ecae84bc8238bb08c1065749812bbbfb62458d3d9bb56e1c5d29d43a119a1bec9294f836d889cdefe41725473a0
-
SSDEEP
768:09cjvq+g+Wbc3Spcow6w8iVvT0TNAI+VYMNC1wNDqJ+jTEGqKbmb1:0OrR3Spcow6wMTNAI+YqNDqkjdq0S1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ada0a586036272bd3006a3235ae8d9731c3fdf8259a7b8183fe92af3897b7d77.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ada0a586036272bd3006a3235ae8d9731c3fdf8259a7b8183fe92af3897b7d77.dll,#12⤵PID:1460
-