Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 02:29
Static task
static1
Behavioral task
behavioral1
Sample
805b7db99981f3b72d1b770baf5ef90f8a2adb8fe92703583f21b55633e7ee9c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
805b7db99981f3b72d1b770baf5ef90f8a2adb8fe92703583f21b55633e7ee9c.dll
Resource
win10v2004-20221111-en
General
-
Target
805b7db99981f3b72d1b770baf5ef90f8a2adb8fe92703583f21b55633e7ee9c.dll
-
Size
79KB
-
MD5
5eeac1a840ab0b99a48ad6d680cd5c9d
-
SHA1
4fca48dbeef3a98f88cee6f7355c3c30c9c47c6a
-
SHA256
805b7db99981f3b72d1b770baf5ef90f8a2adb8fe92703583f21b55633e7ee9c
-
SHA512
c1c3c392748af586ec616c7bf4cffa0f3ad3fe8a649fadab0e726f568dd900ac63815c336e0d3bec6fce61c83ce240c722dc1a7cdeac3d7be1ea6ebde6afd5f8
-
SSDEEP
1536:BxDZ0RZ8nljO6mK2fFsGQqptxccuEaC8pSIaJoX+bZBWy/aRQWmfIm:xjnljbADNecuQ8sIEoXI71SLmfI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26 PID 2044 wrote to memory of 1460 2044 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\805b7db99981f3b72d1b770baf5ef90f8a2adb8fe92703583f21b55633e7ee9c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\805b7db99981f3b72d1b770baf5ef90f8a2adb8fe92703583f21b55633e7ee9c.dll,#12⤵PID:1460
-