Analysis
-
max time kernel
50s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
3fd494b923651f3478080454cc83e13ca44c0091fd40e9d6ae6bc4e2af753228.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3fd494b923651f3478080454cc83e13ca44c0091fd40e9d6ae6bc4e2af753228.dll
Resource
win10v2004-20220901-en
General
-
Target
3fd494b923651f3478080454cc83e13ca44c0091fd40e9d6ae6bc4e2af753228.dll
-
Size
600KB
-
MD5
2fdc7a89dbcefd344ebcf92627826a40
-
SHA1
137f1ee193c284d641222d8afc0cd8ae228a4a48
-
SHA256
3fd494b923651f3478080454cc83e13ca44c0091fd40e9d6ae6bc4e2af753228
-
SHA512
17da26bb3515041c7733f632127f403d92905e0bca7dd7a3040e2b546b66f4f92efd2d123627b9948c288a4a9ee926d6b736cb052c3a28af0dd019bdb69ccce4
-
SSDEEP
12288:71HyurvZ0JPjuTtSu86th1n/hUgiW6QR7t5j3Ooc8NHkC2eoc+bprNH:71HyurvZ0liTwuhtjnj3Ooc8NHkC2eo1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1712 1452 rundll32.exe 28 PID 1452 wrote to memory of 1712 1452 rundll32.exe 28 PID 1452 wrote to memory of 1712 1452 rundll32.exe 28 PID 1452 wrote to memory of 1712 1452 rundll32.exe 28 PID 1452 wrote to memory of 1712 1452 rundll32.exe 28 PID 1452 wrote to memory of 1712 1452 rundll32.exe 28 PID 1452 wrote to memory of 1712 1452 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fd494b923651f3478080454cc83e13ca44c0091fd40e9d6ae6bc4e2af753228.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fd494b923651f3478080454cc83e13ca44c0091fd40e9d6ae6bc4e2af753228.dll,#12⤵PID:1712
-