Analysis
-
max time kernel
26s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 03:40
Behavioral task
behavioral1
Sample
a90d8c30368a1ca19c509a891935e3d2ecdece789bbb8ea12ef144dde707c004.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a90d8c30368a1ca19c509a891935e3d2ecdece789bbb8ea12ef144dde707c004.dll
Resource
win10v2004-20220812-en
General
-
Target
a90d8c30368a1ca19c509a891935e3d2ecdece789bbb8ea12ef144dde707c004.dll
-
Size
50KB
-
MD5
696470ea522c1b5b20bf2312a3d95a70
-
SHA1
5ab0b049268c864494ac59e7f2f06b0672c76bfd
-
SHA256
a90d8c30368a1ca19c509a891935e3d2ecdece789bbb8ea12ef144dde707c004
-
SHA512
5aa458e782c85cb5709b7eb3ae3df4829bd01eec812e514cb0591668f9a59d8191318d52072a3d6aa9cfd1a1c568db45f976a373b269456493ece8e877d2cc2a
-
SSDEEP
768:26cTcjNp0oMrTo/Wxf38Mev0ZS6wBUSmlrCn1x3ipd+i6j0q1jkbSmObnz7MIdeN:23umoMtxmbDmlrI18Z6jdhmO7hdetNfZ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1092-56-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1856 wrote to memory of 1092 1856 rundll32.exe 27 PID 1856 wrote to memory of 1092 1856 rundll32.exe 27 PID 1856 wrote to memory of 1092 1856 rundll32.exe 27 PID 1856 wrote to memory of 1092 1856 rundll32.exe 27 PID 1856 wrote to memory of 1092 1856 rundll32.exe 27 PID 1856 wrote to memory of 1092 1856 rundll32.exe 27 PID 1856 wrote to memory of 1092 1856 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a90d8c30368a1ca19c509a891935e3d2ecdece789bbb8ea12ef144dde707c004.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a90d8c30368a1ca19c509a891935e3d2ecdece789bbb8ea12ef144dde707c004.dll,#12⤵PID:1092
-