Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
fd935999fabe42bb0de8c0d717753735de25d6733c392bf66adb19bf78236eb3.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fd935999fabe42bb0de8c0d717753735de25d6733c392bf66adb19bf78236eb3.dll
Resource
win10v2004-20221111-en
General
-
Target
fd935999fabe42bb0de8c0d717753735de25d6733c392bf66adb19bf78236eb3.dll
-
Size
32KB
-
MD5
4295b02f298cc0270878f61470e39914
-
SHA1
7a6001e001006e8246f61d6bdf1a2a08c5bebd26
-
SHA256
fd935999fabe42bb0de8c0d717753735de25d6733c392bf66adb19bf78236eb3
-
SHA512
8dadd7522750eaa10841a5c1c981f6f4da4459ff928ce0ccdf270efb5b977685cc953a3b0825603ab9b926419cc39f20c40f709d6f1ce800d7b8c7e14bf4e90e
-
SSDEEP
384:n3Djv9NYwKEZwAETtPR9eLi4bpA5E77qDE7h70prlawgJFJfegYCRLnJ:n3fGMXaILzb+E7qEF70NlhCDWglR7J
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1036 1064 rundll32.exe 15 PID 1064 wrote to memory of 1036 1064 rundll32.exe 15 PID 1064 wrote to memory of 1036 1064 rundll32.exe 15 PID 1064 wrote to memory of 1036 1064 rundll32.exe 15 PID 1064 wrote to memory of 1036 1064 rundll32.exe 15 PID 1064 wrote to memory of 1036 1064 rundll32.exe 15 PID 1064 wrote to memory of 1036 1064 rundll32.exe 15
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd935999fabe42bb0de8c0d717753735de25d6733c392bf66adb19bf78236eb3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd935999fabe42bb0de8c0d717753735de25d6733c392bf66adb19bf78236eb3.dll,#12⤵PID:1036
-