Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
6757c9433dfe6225021b30be39d006c435f4772aae497534e830d1b76f99bf7e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6757c9433dfe6225021b30be39d006c435f4772aae497534e830d1b76f99bf7e.dll
Resource
win10v2004-20221111-en
General
-
Target
6757c9433dfe6225021b30be39d006c435f4772aae497534e830d1b76f99bf7e.dll
-
Size
224KB
-
MD5
038d14b99a4e39c3794830355f399454
-
SHA1
3a11b987f69296641fdc4a9e17fca7584bb9ce70
-
SHA256
6757c9433dfe6225021b30be39d006c435f4772aae497534e830d1b76f99bf7e
-
SHA512
909ff60929cd3c08ed0915fe5e779efad8fac1aac5dc75bfbee770db96936529591d6499c54764146dce26d978a74d87b1394b9c72f7eda218a6e84d0a0936f2
-
SSDEEP
3072:MFc+FoEGHm84TRzJIu5CjoFF5fUxqkts9MeZ3fxXltGapQe5hdjqLnQmv+ky:Ph4ZJI3joFFhUxveZ3fpDpQYhFqF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1048 1456 rundll32.exe 27 PID 1456 wrote to memory of 1048 1456 rundll32.exe 27 PID 1456 wrote to memory of 1048 1456 rundll32.exe 27 PID 1456 wrote to memory of 1048 1456 rundll32.exe 27 PID 1456 wrote to memory of 1048 1456 rundll32.exe 27 PID 1456 wrote to memory of 1048 1456 rundll32.exe 27 PID 1456 wrote to memory of 1048 1456 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6757c9433dfe6225021b30be39d006c435f4772aae497534e830d1b76f99bf7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6757c9433dfe6225021b30be39d006c435f4772aae497534e830d1b76f99bf7e.dll,#12⤵PID:1048
-