Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:51
Static task
static1
Behavioral task
behavioral1
Sample
7e95bd897ad75abe2f2c5eeebcc582af7c4b9f1054d2e2bbe5a4a2206067c7e8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e95bd897ad75abe2f2c5eeebcc582af7c4b9f1054d2e2bbe5a4a2206067c7e8.dll
Resource
win10v2004-20220812-en
General
-
Target
7e95bd897ad75abe2f2c5eeebcc582af7c4b9f1054d2e2bbe5a4a2206067c7e8.dll
-
Size
6KB
-
MD5
ec34ae357fc63a1022121574422a2a80
-
SHA1
15d9824a8b5f4d8f09c8e06e31789570dd0ec0b0
-
SHA256
7e95bd897ad75abe2f2c5eeebcc582af7c4b9f1054d2e2bbe5a4a2206067c7e8
-
SHA512
238be0d6eec662b8ea872947069766e79c9bf766dd4809f1b1a566939109be396756a7a884d339851bc7d47ac0e207ceb4bbd4c469dec4ecf8dc7e791bd8bc19
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TINx9EDSVdxwFsn80/zYQfyNwjw/y6RKVwO:unSR6bgYG70SVd8chs0vwKy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4576 4216 rundll32.exe 81 PID 4216 wrote to memory of 4576 4216 rundll32.exe 81 PID 4216 wrote to memory of 4576 4216 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e95bd897ad75abe2f2c5eeebcc582af7c4b9f1054d2e2bbe5a4a2206067c7e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e95bd897ad75abe2f2c5eeebcc582af7c4b9f1054d2e2bbe5a4a2206067c7e8.dll,#12⤵PID:4576
-