Analysis
-
max time kernel
163s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
7e07f48f70ba4cb2b2d63a9d5be9154bab60acbaf660abd505ba84b0b88e3b6e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e07f48f70ba4cb2b2d63a9d5be9154bab60acbaf660abd505ba84b0b88e3b6e.dll
Resource
win10v2004-20221111-en
General
-
Target
7e07f48f70ba4cb2b2d63a9d5be9154bab60acbaf660abd505ba84b0b88e3b6e.dll
-
Size
7KB
-
MD5
f36a59f14bc5a5162f30b60fa8a80fb0
-
SHA1
47c287577ccc45436fa268e814c562b5487a1550
-
SHA256
7e07f48f70ba4cb2b2d63a9d5be9154bab60acbaf660abd505ba84b0b88e3b6e
-
SHA512
8af25d128cf9979c8d00f4abb066eaafa29a804c3303526771f2a6da2adf9437d5aa76af52b2f647141a89bdce30a01b764d6c0fdf70e2011beac1ff7914d434
-
SSDEEP
96:WLRxkjujtjd8jPjcZG2UojL4sPRggZmkgg7s0Vc1VKcscPFZubFTZ7GvP8FudoP:WtqKR6bgYILets
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2124 wrote to memory of 5060 2124 rundll32.exe 83 PID 2124 wrote to memory of 5060 2124 rundll32.exe 83 PID 2124 wrote to memory of 5060 2124 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e07f48f70ba4cb2b2d63a9d5be9154bab60acbaf660abd505ba84b0b88e3b6e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e07f48f70ba4cb2b2d63a9d5be9154bab60acbaf660abd505ba84b0b88e3b6e.dll,#12⤵PID:5060
-