Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 08:03
Behavioral task
behavioral1
Sample
6edaa095d3baf96c1366ad7d2b0499a1bbb53743787ee6860cd60d3fbec88a24.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6edaa095d3baf96c1366ad7d2b0499a1bbb53743787ee6860cd60d3fbec88a24.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
6edaa095d3baf96c1366ad7d2b0499a1bbb53743787ee6860cd60d3fbec88a24.dll
-
Size
308KB
-
MD5
9e256f86e290fb4d7c741a2bb55b39cd
-
SHA1
4016883cd5976a9bc1d8902f3ae8ebf8c00e4d87
-
SHA256
6edaa095d3baf96c1366ad7d2b0499a1bbb53743787ee6860cd60d3fbec88a24
-
SHA512
1fac7bd762f1c84223f1698cb81223c4cb4f04095c63a111ba9785f0bb5e0d44c9e67f46c8c36a001cde27dcd1b891d098ab7b6cae74a35226d71debee4af97d
-
SSDEEP
3072:tqyrgg89zXIU1bhkIEJFh0WRNpr0CTBftJGnx47XIZWMhbXD:Zc954IbhqJF7X0CTBlEnxqXmWM1z
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6edaa095d3baf96c1366ad7d2b0499a1bbb53743787ee6860cd60d3fbec88a24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6edaa095d3baf96c1366ad7d2b0499a1bbb53743787ee6860cd60d3fbec88a24.dll,#12⤵PID:548
-