Analysis
-
max time kernel
23s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:22
Static task
static1
Behavioral task
behavioral1
Sample
5820205baa50008a08cb59661d45366a68322d0fa07f66a97c60f4ae28e17bc3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5820205baa50008a08cb59661d45366a68322d0fa07f66a97c60f4ae28e17bc3.dll
Resource
win10v2004-20221111-en
General
-
Target
5820205baa50008a08cb59661d45366a68322d0fa07f66a97c60f4ae28e17bc3.dll
-
Size
149KB
-
MD5
6e88316e3338b55f1b3e98ceac8b4490
-
SHA1
5c32cf9cbd1187956aa951c845ace036712b98eb
-
SHA256
5820205baa50008a08cb59661d45366a68322d0fa07f66a97c60f4ae28e17bc3
-
SHA512
2b149549d4a733910cb9d92ba3fb92d6c1ebd15322c3b2ad696f1881207b9a27a4e98af31f1ae5945d6f7ac748c5b095e345f2b29ad6352c53d9cf511ff36731
-
SSDEEP
3072:xnw6suji5qR1qJ8d63UQ46Xl6NImeCq3Ot62u7nGLtBYNU0nMXrv+yu5BS:Af5Mqc6EqXl6yCq3Ot62u7nGLtSGrv+x
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5820205baa50008a08cb59661d45366a68322d0fa07f66a97c60f4ae28e17bc3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5820205baa50008a08cb59661d45366a68322d0fa07f66a97c60f4ae28e17bc3.dll,#12⤵PID:944
-