Analysis
-
max time kernel
2s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:31
Behavioral task
behavioral1
Sample
1ff7fd741c44abe84dd302fd9ca67017b0590cffe462f9b79a4f7334d854feb6.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ff7fd741c44abe84dd302fd9ca67017b0590cffe462f9b79a4f7334d854feb6.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
1ff7fd741c44abe84dd302fd9ca67017b0590cffe462f9b79a4f7334d854feb6.dll
-
Size
72KB
-
MD5
e105e99004710c914707c4b47b485fa0
-
SHA1
e570e645605617fbd0a30bf478800284e356e290
-
SHA256
1ff7fd741c44abe84dd302fd9ca67017b0590cffe462f9b79a4f7334d854feb6
-
SHA512
1047ab5b0a344c4ce340f0cee8b4301b0a86b7a97b93918c100f9f811f1e7dcdb896dd5e8d88a8b366b78a42dcdf41b0624e463b3dedb2a56ad94b88786f50a3
-
SSDEEP
1536:mPO6KEVbsVP0gyVZOiSEqBW2U1aM/mdaWRqvEQCdUvGe/TsGdQ:cMEVbsVcuEqs172hACdUvGeYGdQ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1380 1180 rundll32.exe 28 PID 1180 wrote to memory of 1380 1180 rundll32.exe 28 PID 1180 wrote to memory of 1380 1180 rundll32.exe 28 PID 1180 wrote to memory of 1380 1180 rundll32.exe 28 PID 1180 wrote to memory of 1380 1180 rundll32.exe 28 PID 1180 wrote to memory of 1380 1180 rundll32.exe 28 PID 1180 wrote to memory of 1380 1180 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ff7fd741c44abe84dd302fd9ca67017b0590cffe462f9b79a4f7334d854feb6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ff7fd741c44abe84dd302fd9ca67017b0590cffe462f9b79a4f7334d854feb6.dll,#12⤵PID:1380
-