Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 07:51
Static task
static1
Behavioral task
behavioral1
Sample
7a475850d34639066d178a53a5b88ba368ca709677986a13d7d5192c6aa2a89f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a475850d34639066d178a53a5b88ba368ca709677986a13d7d5192c6aa2a89f.dll
Resource
win10v2004-20220812-en
General
-
Target
7a475850d34639066d178a53a5b88ba368ca709677986a13d7d5192c6aa2a89f.dll
-
Size
792KB
-
MD5
de7c3085a3dc1e8a45799ab1e5317030
-
SHA1
e7f681f722986f0d0b010e3efbec0143bd13d3af
-
SHA256
7a475850d34639066d178a53a5b88ba368ca709677986a13d7d5192c6aa2a89f
-
SHA512
806b302c95af17e8e4cb1c5470346d7402bb331989642e43ea958f2cf249e6c6465d7adb3c3d77a964c7ad473f8aca283729c2057cc99857252025224d3e155a
-
SSDEEP
24576:+vnImr1gCVYxHnt0NvMveLYHgKn4J9VZrvsyNWAHeKlUUM:cnImr17YxHnt0NvMveL869VZr1NWA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2296 wrote to memory of 5040 2296 rundll32.exe 76 PID 2296 wrote to memory of 5040 2296 rundll32.exe 76 PID 2296 wrote to memory of 5040 2296 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a475850d34639066d178a53a5b88ba368ca709677986a13d7d5192c6aa2a89f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a475850d34639066d178a53a5b88ba368ca709677986a13d7d5192c6aa2a89f.dll,#12⤵PID:5040
-