Analysis
-
max time kernel
19s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:22
Static task
static1
Behavioral task
behavioral1
Sample
75a723a2d85f9b3f5cb94fce177861f538921e3d5af7da85427c9c62e154ad94.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75a723a2d85f9b3f5cb94fce177861f538921e3d5af7da85427c9c62e154ad94.dll
Resource
win10v2004-20220901-en
General
-
Target
75a723a2d85f9b3f5cb94fce177861f538921e3d5af7da85427c9c62e154ad94.dll
-
Size
94KB
-
MD5
f5f138d1b73c43d368bbd22de99d2894
-
SHA1
d906b199673199b3076b50b39521e17600a7c6c1
-
SHA256
75a723a2d85f9b3f5cb94fce177861f538921e3d5af7da85427c9c62e154ad94
-
SHA512
ec3a7d59bcd792a7a2e7ab12000d2bdab08307c1f3dc8a4c207ab60821277542ead5ab89d2a5d577e69482a8bb795421b67dec6a8cc36fafe574d752d05c1d10
-
SSDEEP
1536:8C8XXBmAM0KCgRlWZ+VL9arWfct+LRhBgkXNtse3v2IkFtTgSpZdrHldAVMpWEKL:A8PCgRUZ+VLor/tiLgkXNt53v2IkAAZW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 1676 1584 rundll32.exe rundll32.exe
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75a723a2d85f9b3f5cb94fce177861f538921e3d5af7da85427c9c62e154ad94.dll,#11⤵PID:1676
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75a723a2d85f9b3f5cb94fce177861f538921e3d5af7da85427c9c62e154ad94.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1584