Analysis
-
max time kernel
40s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 11:59
Behavioral task
behavioral1
Sample
0a89f68ce7e2ff2e4e9e413c068cb2b61fd919dd791f5ee2c168abf04947ccef.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a89f68ce7e2ff2e4e9e413c068cb2b61fd919dd791f5ee2c168abf04947ccef.dll
Resource
win10v2004-20221111-en
General
-
Target
0a89f68ce7e2ff2e4e9e413c068cb2b61fd919dd791f5ee2c168abf04947ccef.dll
-
Size
677KB
-
MD5
8fd5416152bd5afb2185c142235da0ac
-
SHA1
c010bfdecb11224c8d7c869713fed3703553f60b
-
SHA256
0a89f68ce7e2ff2e4e9e413c068cb2b61fd919dd791f5ee2c168abf04947ccef
-
SHA512
ff5290d40708527089c56c3b267114ac49d61e50fcee9d9e6c11bc1497b1190a613524d267cddf234802deb9660b62029f9b7a65ac7014fea90491da590be60c
-
SSDEEP
12288:cq4pxZKKw/kj2hKq6ab/XuIpWrDSEHr8s0AaOV3fsjeU5X2qdOgVY5sjop5e8V:0pPwhKu/XuHJLNPaO6jb5X2qdOgVRs5d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1076 864 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a89f68ce7e2ff2e4e9e413c068cb2b61fd919dd791f5ee2c168abf04947ccef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a89f68ce7e2ff2e4e9e413c068cb2b61fd919dd791f5ee2c168abf04947ccef.dll,#12⤵PID:1076