Analysis
-
max time kernel
9s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
7647ccbefdc0d5376e9a8a1454af2a1142e24b4a61719891d44534e12b1df672.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7647ccbefdc0d5376e9a8a1454af2a1142e24b4a61719891d44534e12b1df672.dll
Resource
win10v2004-20221111-en
General
-
Target
7647ccbefdc0d5376e9a8a1454af2a1142e24b4a61719891d44534e12b1df672.dll
-
Size
705KB
-
MD5
72b452f6412a24a0ae0b151d57b86e08
-
SHA1
6ec7aa65742b0ae97468c292db1ae7ca63145dda
-
SHA256
7647ccbefdc0d5376e9a8a1454af2a1142e24b4a61719891d44534e12b1df672
-
SHA512
1786aa3d77c1207b679476781953067a5f9477306980a5ceb15509c35b9b0c402f442776b4fce950037c95bb87de4a0d52f01f738fc1f73e3ce0c2d1432c4729
-
SSDEEP
12288:A1O3i5acSDofCUEW5A+Hl+lfaSJUtqSHBqtL0kaXo9I15vsNTUqn3Jy:A1wsV5CUEW5A9PKrItxMoqDkNTU+3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7647ccbefdc0d5376e9a8a1454af2a1142e24b4a61719891d44534e12b1df672.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7647ccbefdc0d5376e9a8a1454af2a1142e24b4a61719891d44534e12b1df672.dll,#12⤵PID:960
-