Analysis
-
max time kernel
2s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 21:37
Static task
static1
Behavioral task
behavioral1
Sample
57caeb502a2eb57b159f55aba08c66dca62607b85071ec8ebf6cbf216110b345.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57caeb502a2eb57b159f55aba08c66dca62607b85071ec8ebf6cbf216110b345.dll
Resource
win10v2004-20221111-en
General
-
Target
57caeb502a2eb57b159f55aba08c66dca62607b85071ec8ebf6cbf216110b345.dll
-
Size
6KB
-
MD5
68ea15ba7b9593284cb4c28193e46b00
-
SHA1
0f88b6cfc5263edbfe8aa84d385d6a85e544da4d
-
SHA256
57caeb502a2eb57b159f55aba08c66dca62607b85071ec8ebf6cbf216110b345
-
SHA512
7213437929713717da9c7d42cd276e61123c142a754fb2adeb50f331867e9c69bd94567ece6ea96cbc3efd67048604742eb6a990fd7581f3c13dd08dcb10b415
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7KU8:nGTWJGp0UZUd6378snt7Kd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1912 1020 rundll32.exe 27 PID 1020 wrote to memory of 1912 1020 rundll32.exe 27 PID 1020 wrote to memory of 1912 1020 rundll32.exe 27 PID 1020 wrote to memory of 1912 1020 rundll32.exe 27 PID 1020 wrote to memory of 1912 1020 rundll32.exe 27 PID 1020 wrote to memory of 1912 1020 rundll32.exe 27 PID 1020 wrote to memory of 1912 1020 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57caeb502a2eb57b159f55aba08c66dca62607b85071ec8ebf6cbf216110b345.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57caeb502a2eb57b159f55aba08c66dca62607b85071ec8ebf6cbf216110b345.dll,#12⤵PID:1912
-