Analysis
-
max time kernel
25s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:14
Static task
static1
Behavioral task
behavioral1
Sample
410aa7bbb8bfe10a5e2e127ecb082184fa03ead20432025d7713a8bd6c298519.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
410aa7bbb8bfe10a5e2e127ecb082184fa03ead20432025d7713a8bd6c298519.dll
Resource
win10v2004-20220812-en
General
-
Target
410aa7bbb8bfe10a5e2e127ecb082184fa03ead20432025d7713a8bd6c298519.dll
-
Size
184KB
-
MD5
963c0ba1f8dbc0f851240fc256c39644
-
SHA1
8f30bd9bb5f4f6cfb0a9acd82cb458d844ff30fb
-
SHA256
410aa7bbb8bfe10a5e2e127ecb082184fa03ead20432025d7713a8bd6c298519
-
SHA512
0591d6498470435993b5bc723ce4df8fc9a45f65239cd82bfc5c43e117d43ab51a723a8638dffaa997dcd7bef4eee606f9e956d8edf909b069ce2687fe7acc9d
-
SSDEEP
1536:PaIHIJkuvfZ/AuwZBy2xDoSLVYOzi32v+JAIRprTL4InjPn2HlNySsn4/StI9S5t:SkyxvfGZUSx3eSIRprQun4/kI97g
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1732 1636 rundll32.exe 27 PID 1636 wrote to memory of 1732 1636 rundll32.exe 27 PID 1636 wrote to memory of 1732 1636 rundll32.exe 27 PID 1636 wrote to memory of 1732 1636 rundll32.exe 27 PID 1636 wrote to memory of 1732 1636 rundll32.exe 27 PID 1636 wrote to memory of 1732 1636 rundll32.exe 27 PID 1636 wrote to memory of 1732 1636 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410aa7bbb8bfe10a5e2e127ecb082184fa03ead20432025d7713a8bd6c298519.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410aa7bbb8bfe10a5e2e127ecb082184fa03ead20432025d7713a8bd6c298519.dll,#12⤵PID:1732
-