Analysis
-
max time kernel
130s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
7f5061e5729b186d0905e642a3f58ee80fcdd4e9c2c6e43831c48db25a9634dc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7f5061e5729b186d0905e642a3f58ee80fcdd4e9c2c6e43831c48db25a9634dc.dll
Resource
win10v2004-20221111-en
General
-
Target
7f5061e5729b186d0905e642a3f58ee80fcdd4e9c2c6e43831c48db25a9634dc.dll
-
Size
6KB
-
MD5
4b53854fa0680ce3c6528a57c74e0a10
-
SHA1
94d05ccf76cdb82f81dafdbc2ea1701b6bf3263d
-
SHA256
7f5061e5729b186d0905e642a3f58ee80fcdd4e9c2c6e43831c48db25a9634dc
-
SHA512
aaa28cb0130c783abc89cae5c6079fa5169c8a7303e0d7d397036a428046bd190edc41e7fdd5a5b2d64c58e8a7609223ef7510ef364d3f565366622402cdf3d9
-
SSDEEP
96:juNrYuJ59oAwGQUI/TQahtCl8X3pSHnmnD7w4dNEN5:juLJ/oAdQPQa2aeng7XwN5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2052 2300 rundll32.exe 85 PID 2300 wrote to memory of 2052 2300 rundll32.exe 85 PID 2300 wrote to memory of 2052 2300 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5061e5729b186d0905e642a3f58ee80fcdd4e9c2c6e43831c48db25a9634dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5061e5729b186d0905e642a3f58ee80fcdd4e9c2c6e43831c48db25a9634dc.dll,#12⤵PID:2052
-