Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
8cf846d07bf4ccd9385c09e42a3b7d171b22c83eac5aa4bfcc6a1818a4e8712a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8cf846d07bf4ccd9385c09e42a3b7d171b22c83eac5aa4bfcc6a1818a4e8712a.dll
Resource
win10v2004-20220812-en
General
-
Target
8cf846d07bf4ccd9385c09e42a3b7d171b22c83eac5aa4bfcc6a1818a4e8712a.dll
-
Size
136KB
-
MD5
32857126376bf723510b75530c8ab8a2
-
SHA1
ab881caba8a40136d5f6f89ea7cb7d2048cd8a09
-
SHA256
8cf846d07bf4ccd9385c09e42a3b7d171b22c83eac5aa4bfcc6a1818a4e8712a
-
SHA512
3d8c1a55da8dcd00886bb890b3aa371591993507b0781756968a16c344b735b112663c83072540e59c8e17f04f3b3bde789077843ec30f0b3f291421b243107b
-
SSDEEP
3072:CztcfuQif7Tno6uumyeITqpivu004tNxjxz:ceWQ+3oVoeYqpSu0045jx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cf846d07bf4ccd9385c09e42a3b7d171b22c83eac5aa4bfcc6a1818a4e8712a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cf846d07bf4ccd9385c09e42a3b7d171b22c83eac5aa4bfcc6a1818a4e8712a.dll,#12⤵PID:1672
-