Analysis
-
max time kernel
39s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
f7e4d6eea3fdc799f2e834560a56b532427c2d2fd7cbe2b0ff1f585ca876c4ea.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f7e4d6eea3fdc799f2e834560a56b532427c2d2fd7cbe2b0ff1f585ca876c4ea.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
f7e4d6eea3fdc799f2e834560a56b532427c2d2fd7cbe2b0ff1f585ca876c4ea.dll
-
Size
5KB
-
MD5
76f681b0af459fd6db3b6126a5fa1120
-
SHA1
f900abff11932f5a62c98f161d0fd617603d8379
-
SHA256
f7e4d6eea3fdc799f2e834560a56b532427c2d2fd7cbe2b0ff1f585ca876c4ea
-
SHA512
74bf3537f26895794b54ce365f6c6d610ef0191a9ff5ed3b3515a9ee189942a14fdf93464d802e938d84ed8c7875629536cbca59b45192ebc44fc686c3e7c7b8
-
SSDEEP
96:XprYDpKnI6wJ+Ls7guyHejyn/I9l0iaiTIoQ0:XUcA+ggd+W/If0ijQ0
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2012 2028 rundll32.exe 28 PID 2028 wrote to memory of 2012 2028 rundll32.exe 28 PID 2028 wrote to memory of 2012 2028 rundll32.exe 28 PID 2028 wrote to memory of 2012 2028 rundll32.exe 28 PID 2028 wrote to memory of 2012 2028 rundll32.exe 28 PID 2028 wrote to memory of 2012 2028 rundll32.exe 28 PID 2028 wrote to memory of 2012 2028 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7e4d6eea3fdc799f2e834560a56b532427c2d2fd7cbe2b0ff1f585ca876c4ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7e4d6eea3fdc799f2e834560a56b532427c2d2fd7cbe2b0ff1f585ca876c4ea.dll,#12⤵PID:2012
-