Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
e622982649207927fbb2b90de2ae966cecae99ae0ab4c467ea650584e47d02b2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e622982649207927fbb2b90de2ae966cecae99ae0ab4c467ea650584e47d02b2.dll
Resource
win10v2004-20221111-en
General
-
Target
e622982649207927fbb2b90de2ae966cecae99ae0ab4c467ea650584e47d02b2.dll
-
Size
43KB
-
MD5
c2dae2af9448d7540ccc29dc848d62f6
-
SHA1
a5a0d01a3577d4af00a3775ddfa8341db54e2129
-
SHA256
e622982649207927fbb2b90de2ae966cecae99ae0ab4c467ea650584e47d02b2
-
SHA512
c5b42eef8535752c3787cb339d268147bd503b61aaf3fb04fdc9a663c4e4225dcfac057f5289096c7c6747aaab10ed4c277e4356f577adaacb9e3fcf18d7b160
-
SSDEEP
768:+XYdkdD1hrilP7OWGuz74ibTVG+aBi1cztX2E3EygtyWgPQw:+XYdaRiF7f7to+ktmKgtyWM
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e622982649207927fbb2b90de2ae966cecae99ae0ab4c467ea650584e47d02b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e622982649207927fbb2b90de2ae966cecae99ae0ab4c467ea650584e47d02b2.dll,#12⤵PID:1472
-