Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:47
Behavioral task
behavioral1
Sample
e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll
-
Size
74KB
-
MD5
69b2e1fd5dcdf3c68c4a6062cf48c080
-
SHA1
133bb66ea8532354790711942f42dbcd8a9df1ff
-
SHA256
e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297
-
SHA512
2149fd8b68a8f63c58f511459486d02e33c53f6808debde2935a87dc6070bc21682291d25374bddfba45fc8d22b90104f22e5e123b24a81c1b50425a33eb212c
-
SSDEEP
1536:LszMRUysuz6wzEYLNqBNBGLGVca8EC9HexOBpln1IpIz4KHFbMMvg:L6PdwIkaN0ba8WxUaKMcBe
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1704 1668 rundll32.exe 27 PID 1668 wrote to memory of 1704 1668 rundll32.exe 27 PID 1668 wrote to memory of 1704 1668 rundll32.exe 27 PID 1668 wrote to memory of 1704 1668 rundll32.exe 27 PID 1668 wrote to memory of 1704 1668 rundll32.exe 27 PID 1668 wrote to memory of 1704 1668 rundll32.exe 27 PID 1668 wrote to memory of 1704 1668 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll,#12⤵PID:1704
-