Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
9f7d12f060fcdd57274da3d1c7b4a0087f11df53540b726d4e68be821f43397f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9f7d12f060fcdd57274da3d1c7b4a0087f11df53540b726d4e68be821f43397f.dll
Resource
win10v2004-20221111-en
General
-
Target
9f7d12f060fcdd57274da3d1c7b4a0087f11df53540b726d4e68be821f43397f.dll
-
Size
70KB
-
MD5
f44776144677a2232cb9ba8a9cbb90e0
-
SHA1
b586845be4fc581c8ee1ca58afbe0886311a29af
-
SHA256
9f7d12f060fcdd57274da3d1c7b4a0087f11df53540b726d4e68be821f43397f
-
SHA512
a22559e3caeacfd5d5d00907fa63a4869d760aebc5ad377f4f0a82a89b1865834a9217e7c3d1e66511affc5ed02f57d3169313aaaa78775557a359be4f8fcc88
-
SSDEEP
1536:hXK4c30hNnvg77d7iwHcd4C2l7GoOjkIy5n5Pejwz5wLq0CaByaQ/r:ha4C0gXRTHOEl7ZOcD+q0C0ya
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f7d12f060fcdd57274da3d1c7b4a0087f11df53540b726d4e68be821f43397f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f7d12f060fcdd57274da3d1c7b4a0087f11df53540b726d4e68be821f43397f.dll,#12⤵PID:2032
-