Analysis
-
max time kernel
48s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
cb5bc5522af9429440c881749f240eabd982ad164aa5c5fac9ec118d0410421f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb5bc5522af9429440c881749f240eabd982ad164aa5c5fac9ec118d0410421f.dll
Resource
win10v2004-20221111-en
General
-
Target
cb5bc5522af9429440c881749f240eabd982ad164aa5c5fac9ec118d0410421f.dll
-
Size
712KB
-
MD5
241c7b22eeb1092a2bd5d4111e66dc10
-
SHA1
634e61cbe0376e870e57112d57df9848a5a88fa5
-
SHA256
cb5bc5522af9429440c881749f240eabd982ad164aa5c5fac9ec118d0410421f
-
SHA512
e055cdd8c53b98f7e02d27d43b3fc4d6a37152ba5a568e7eb57a2741e0a136ca7d15e8ae2c29012f50421334674ff3c8c973996de2f23b33b15591134c4be613
-
SSDEEP
6144:8qW9XPHltF9D4PPgdHOz07eDhMvViUSQiyR8sQr:8qW9XPHltF9D43gZOo7GhMViiiHx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1680 2020 rundll32.exe 28 PID 2020 wrote to memory of 1680 2020 rundll32.exe 28 PID 2020 wrote to memory of 1680 2020 rundll32.exe 28 PID 2020 wrote to memory of 1680 2020 rundll32.exe 28 PID 2020 wrote to memory of 1680 2020 rundll32.exe 28 PID 2020 wrote to memory of 1680 2020 rundll32.exe 28 PID 2020 wrote to memory of 1680 2020 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb5bc5522af9429440c881749f240eabd982ad164aa5c5fac9ec118d0410421f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb5bc5522af9429440c881749f240eabd982ad164aa5c5fac9ec118d0410421f.dll,#12⤵PID:1680
-