Analysis
-
max time kernel
42s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 05:19
Static task
static1
Behavioral task
behavioral1
Sample
8f845e1cf883c0c9992dbb1acfc99e837108f1d8039afd55f16377e8287e0001.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f845e1cf883c0c9992dbb1acfc99e837108f1d8039afd55f16377e8287e0001.dll
Resource
win10v2004-20221111-en
General
-
Target
8f845e1cf883c0c9992dbb1acfc99e837108f1d8039afd55f16377e8287e0001.dll
-
Size
368KB
-
MD5
6cae0dbfbd296712fab66ede96d73224
-
SHA1
7de07c437c2704dc1553c8a7838d103ca89ee163
-
SHA256
8f845e1cf883c0c9992dbb1acfc99e837108f1d8039afd55f16377e8287e0001
-
SHA512
4fc14d6e27cd127dc50c1888aef62f1cf90dc334c82e2cad134edfc6de10c70e4c6a062a53efc776b7f590f804acb0d9b790ccf021a1683b7760b15e9a5df4f8
-
SSDEEP
6144:b43KTHEJrUWmHBOtuzW2C/oOWFzRqjymbjMxBvgt+uQcotlvyicb4usRG:b4aTHE5URHARbgOUz0jyjHY0t/l6nbjv
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 932 1452 rundll32.exe 28 PID 1452 wrote to memory of 932 1452 rundll32.exe 28 PID 1452 wrote to memory of 932 1452 rundll32.exe 28 PID 1452 wrote to memory of 932 1452 rundll32.exe 28 PID 1452 wrote to memory of 932 1452 rundll32.exe 28 PID 1452 wrote to memory of 932 1452 rundll32.exe 28 PID 1452 wrote to memory of 932 1452 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f845e1cf883c0c9992dbb1acfc99e837108f1d8039afd55f16377e8287e0001.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f845e1cf883c0c9992dbb1acfc99e837108f1d8039afd55f16377e8287e0001.dll,#12⤵PID:932
-