Analysis
-
max time kernel
57s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
8653e43f47cecf20e0458c339c6bdf13696ef1dac12f0395b5453fe696c2d38f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8653e43f47cecf20e0458c339c6bdf13696ef1dac12f0395b5453fe696c2d38f.dll
Resource
win10v2004-20220812-en
General
-
Target
8653e43f47cecf20e0458c339c6bdf13696ef1dac12f0395b5453fe696c2d38f.dll
-
Size
192KB
-
MD5
6549034fbe3a04e67106b9fc649cbc50
-
SHA1
a30352e69a9070de0798cb51f13ce583b0dab029
-
SHA256
8653e43f47cecf20e0458c339c6bdf13696ef1dac12f0395b5453fe696c2d38f
-
SHA512
0b921c0653ee38982a1bf159f66ae5c39314b6cb3aa756ef51d1c30f4710e92457d61326748c80153804633d95e1c9b1da11487f3d2c79c36b8481b008a7d362
-
SSDEEP
3072:lqHMKS/UvZKPiFbW0T3WLyRIzYRgwIeFJP08sKJqPDGgCVfVZnoC0A4b4fUfK:+e/LiFbVTmaIzYRgJEh0CYPd2zno/U
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1256 1392 rundll32.exe 28 PID 1392 wrote to memory of 1256 1392 rundll32.exe 28 PID 1392 wrote to memory of 1256 1392 rundll32.exe 28 PID 1392 wrote to memory of 1256 1392 rundll32.exe 28 PID 1392 wrote to memory of 1256 1392 rundll32.exe 28 PID 1392 wrote to memory of 1256 1392 rundll32.exe 28 PID 1392 wrote to memory of 1256 1392 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8653e43f47cecf20e0458c339c6bdf13696ef1dac12f0395b5453fe696c2d38f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8653e43f47cecf20e0458c339c6bdf13696ef1dac12f0395b5453fe696c2d38f.dll,#12⤵PID:1256
-