Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:51
Static task
static1
Behavioral task
behavioral1
Sample
7e22260da2f6f04bb0c30fa8c737dda200062304187ad494f116606fdff1467f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e22260da2f6f04bb0c30fa8c737dda200062304187ad494f116606fdff1467f.dll
Resource
win10v2004-20220901-en
General
-
Target
7e22260da2f6f04bb0c30fa8c737dda200062304187ad494f116606fdff1467f.dll
-
Size
7KB
-
MD5
2524a2b68ba8cff4680ebae60f4f58f0
-
SHA1
78b12d810eb6ae0129f4ec0b62acd88f7dfe784d
-
SHA256
7e22260da2f6f04bb0c30fa8c737dda200062304187ad494f116606fdff1467f
-
SHA512
390248042bcbf6e8b6acef08f4b02788d743f19275950af69b3a20a4d119258db82eff800241a494836efbd73556797adbc6d23a878e4b8930e0a68af9dfb1b6
-
SSDEEP
48:Ss0wYjRDmah965/icI7Tp3srHbezbKsrp4Wyn6WJ0WE2OkMIVEWHDZaO4B+B:z0B96BLIzEd0WEW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3548 wrote to memory of 4904 3548 rundll32.exe 80 PID 3548 wrote to memory of 4904 3548 rundll32.exe 80 PID 3548 wrote to memory of 4904 3548 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e22260da2f6f04bb0c30fa8c737dda200062304187ad494f116606fdff1467f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e22260da2f6f04bb0c30fa8c737dda200062304187ad494f116606fdff1467f.dll,#12⤵PID:4904
-