Analysis
-
max time kernel
31s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 06:07
Static task
static1
Behavioral task
behavioral1
Sample
272fcc0c223a57bc66d5a461418d1e368d52cf778d893e7a99e15abed8312e86.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
272fcc0c223a57bc66d5a461418d1e368d52cf778d893e7a99e15abed8312e86.dll
Resource
win10v2004-20221111-en
General
-
Target
272fcc0c223a57bc66d5a461418d1e368d52cf778d893e7a99e15abed8312e86.dll
-
Size
137KB
-
MD5
c4e3a5658b309d6ff4961c787c63f710
-
SHA1
1fc8cb21fdd6f4fb0eb2e9d1f07a117e4e76ac69
-
SHA256
272fcc0c223a57bc66d5a461418d1e368d52cf778d893e7a99e15abed8312e86
-
SHA512
db93c2e419ff33e1ea90b951eccf4f4022f1bc343e20a528b475d08a5c9eeb784d4f3a5217dc87dc20e7facb1319919eb0f8a0514d1839ac7ef70271a245266d
-
SSDEEP
3072:q8wA0TMD5Dqg0yN1nvAANSw8ltWoihGCyMOLySWst+fXxj0ILe:q8w6D4Kotup0LWI+fY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2016 1820 rundll32.exe 27 PID 1820 wrote to memory of 2016 1820 rundll32.exe 27 PID 1820 wrote to memory of 2016 1820 rundll32.exe 27 PID 1820 wrote to memory of 2016 1820 rundll32.exe 27 PID 1820 wrote to memory of 2016 1820 rundll32.exe 27 PID 1820 wrote to memory of 2016 1820 rundll32.exe 27 PID 1820 wrote to memory of 2016 1820 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\272fcc0c223a57bc66d5a461418d1e368d52cf778d893e7a99e15abed8312e86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\272fcc0c223a57bc66d5a461418d1e368d52cf778d893e7a99e15abed8312e86.dll,#12⤵PID:2016
-