Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 05:10
Static task
static1
Behavioral task
behavioral1
Sample
34a1c177cfec94ff424c77b5bbcd3268705cebfc0af72acfa0b42a2d9c8fbc4f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34a1c177cfec94ff424c77b5bbcd3268705cebfc0af72acfa0b42a2d9c8fbc4f.dll
Resource
win10v2004-20220901-en
General
-
Target
34a1c177cfec94ff424c77b5bbcd3268705cebfc0af72acfa0b42a2d9c8fbc4f.dll
-
Size
19KB
-
MD5
41f7ca0ab4d47887a13d42e452b4fda0
-
SHA1
83d167a9d578469603863f46e990ea580403adcd
-
SHA256
34a1c177cfec94ff424c77b5bbcd3268705cebfc0af72acfa0b42a2d9c8fbc4f
-
SHA512
b4629f80f30552ae1999c66f9e070a55d152cc9d8de4186e0aab5bb8bb1d9fa81c8ff12aba15cff3818e250011b6bb9b22037bf10ddccfc03117226b9d68a01d
-
SSDEEP
384:tZRQS1yySkdEFB0ANGtwNhKK2UEDC/4VXp6oLhJqUZY4:nPyyk02GtwNX9YSUXkGzF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34a1c177cfec94ff424c77b5bbcd3268705cebfc0af72acfa0b42a2d9c8fbc4f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34a1c177cfec94ff424c77b5bbcd3268705cebfc0af72acfa0b42a2d9c8fbc4f.dll,#12⤵PID:1644
-