Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 19:56
Behavioral task
behavioral1
Sample
ca59bc5a9e1a979abeb7dac189519906a77720feb6561a5e96f8453d440d3364.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ca59bc5a9e1a979abeb7dac189519906a77720feb6561a5e96f8453d440d3364.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
ca59bc5a9e1a979abeb7dac189519906a77720feb6561a5e96f8453d440d3364.dll
-
Size
69KB
-
MD5
f9801c09ab0dfd31938a8df280b2b8b3
-
SHA1
cbe734f81b607b9ebef269bc23222ba175d4874d
-
SHA256
ca59bc5a9e1a979abeb7dac189519906a77720feb6561a5e96f8453d440d3364
-
SHA512
df56b8cef28b4788912a96b708d54150644a3397b1d738a6ca0a8d7793cd3dc70fa62369afcf7f25d04fdbd2974cb839d481d870b2bdfd7ba5d92de076e40d81
-
SSDEEP
1536:ob8Vwn/JZ16v/oD/fIzv9utuxZBGF4OWg2mG5n3TPIJrJ5O:oz/L16v/oDScEZBy4OWGG5nIrJ5O
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1112 1768 rundll32.exe 27 PID 1768 wrote to memory of 1112 1768 rundll32.exe 27 PID 1768 wrote to memory of 1112 1768 rundll32.exe 27 PID 1768 wrote to memory of 1112 1768 rundll32.exe 27 PID 1768 wrote to memory of 1112 1768 rundll32.exe 27 PID 1768 wrote to memory of 1112 1768 rundll32.exe 27 PID 1768 wrote to memory of 1112 1768 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca59bc5a9e1a979abeb7dac189519906a77720feb6561a5e96f8453d440d3364.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca59bc5a9e1a979abeb7dac189519906a77720feb6561a5e96f8453d440d3364.dll,#12⤵PID:1112
-