Analysis
-
max time kernel
23s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
83b40a4f98c9ba93e00116230f0259de6ab149c3ab7e4f73c07201563813a391.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83b40a4f98c9ba93e00116230f0259de6ab149c3ab7e4f73c07201563813a391.dll
Resource
win10v2004-20220812-en
General
-
Target
83b40a4f98c9ba93e00116230f0259de6ab149c3ab7e4f73c07201563813a391.dll
-
Size
80KB
-
MD5
4fa856141215b7d78a4fb8dd084f8196
-
SHA1
56a895e30774f3b355a4389c37dd2da277de4843
-
SHA256
83b40a4f98c9ba93e00116230f0259de6ab149c3ab7e4f73c07201563813a391
-
SHA512
ce4ecd71cbabf5b7d8c20b9bee6504967b22e1c146f3bcd0da48f1d157e76df8ceea386e5690a96f3055e95a3ba2e096992da73dd218a723269082ca8f83a00d
-
SSDEEP
768:G+1moHCJb0kICMESBV1ittSoiIwpEOeZP6F0WgFXRF0qePkijNoHOlZ9PTAM5O50:G+EAopvFiI8U5C4hF0qe5DlZ97AMQ5e
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1664 1352 rundll32.exe 27 PID 1352 wrote to memory of 1664 1352 rundll32.exe 27 PID 1352 wrote to memory of 1664 1352 rundll32.exe 27 PID 1352 wrote to memory of 1664 1352 rundll32.exe 27 PID 1352 wrote to memory of 1664 1352 rundll32.exe 27 PID 1352 wrote to memory of 1664 1352 rundll32.exe 27 PID 1352 wrote to memory of 1664 1352 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83b40a4f98c9ba93e00116230f0259de6ab149c3ab7e4f73c07201563813a391.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83b40a4f98c9ba93e00116230f0259de6ab149c3ab7e4f73c07201563813a391.dll,#12⤵PID:1664
-