Analysis
-
max time kernel
238s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll
Resource
win10v2004-20221111-en
General
-
Target
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll
-
Size
280KB
-
MD5
e5c32728347536f903877bd7c666b2a5
-
SHA1
b387c05026513e52c4c9057d1cc85be70f743bd6
-
SHA256
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8
-
SHA512
df1bb68d7a27bf4388c01bd3101d8872662cbae90ea71b005b47b6b2bc01b4ab8047cb8b4f4539c6315e793542eb95fe0a21c740c8127c8fa219608a6a271a52
-
SSDEEP
3072:hddvsfm7qaGC2nbWh4FVrlX0tF2FIRp+nwHMug2pFoYSa2M6ueJsueqfdlxbWz:ho3bWA08IRpOVMQueJsueqf3d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1496 1504 rundll32.exe 28 PID 1504 wrote to memory of 1496 1504 rundll32.exe 28 PID 1504 wrote to memory of 1496 1504 rundll32.exe 28 PID 1504 wrote to memory of 1496 1504 rundll32.exe 28 PID 1504 wrote to memory of 1496 1504 rundll32.exe 28 PID 1504 wrote to memory of 1496 1504 rundll32.exe 28 PID 1504 wrote to memory of 1496 1504 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll,#12⤵PID:1496
-