Analysis
-
max time kernel
23s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
ac66ddb94315d1aca0f02c045df5bc007753a75252123588bf5b7d24d0bca43a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac66ddb94315d1aca0f02c045df5bc007753a75252123588bf5b7d24d0bca43a.dll
Resource
win10v2004-20221111-en
General
-
Target
ac66ddb94315d1aca0f02c045df5bc007753a75252123588bf5b7d24d0bca43a.dll
-
Size
6KB
-
MD5
3dbcb0103caa6e2f10d932b78dc232a0
-
SHA1
6be672638ac0f0400cfaa20098cb9344efe385cc
-
SHA256
ac66ddb94315d1aca0f02c045df5bc007753a75252123588bf5b7d24d0bca43a
-
SHA512
0b803a5fd2b846d9ef0c14ba8eff1bac06cd6cad8333c67cd9f2929bd4efb6046d0546c75f68bdf1a69b231f34d60348363e0d0106978f6cecf34f43916fb0bf
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7Y8LJ:nGTWJGp0UZUd6378snt7Y8LJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1724 1636 rundll32.exe 28 PID 1636 wrote to memory of 1724 1636 rundll32.exe 28 PID 1636 wrote to memory of 1724 1636 rundll32.exe 28 PID 1636 wrote to memory of 1724 1636 rundll32.exe 28 PID 1636 wrote to memory of 1724 1636 rundll32.exe 28 PID 1636 wrote to memory of 1724 1636 rundll32.exe 28 PID 1636 wrote to memory of 1724 1636 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac66ddb94315d1aca0f02c045df5bc007753a75252123588bf5b7d24d0bca43a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac66ddb94315d1aca0f02c045df5bc007753a75252123588bf5b7d24d0bca43a.dll,#12⤵PID:1724
-