Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
4a3dcde9d2c869b937a576a0cf41b38316368c166cab06f3e44a0a76c451f271.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a3dcde9d2c869b937a576a0cf41b38316368c166cab06f3e44a0a76c451f271.dll
Resource
win10v2004-20220812-en
General
-
Target
4a3dcde9d2c869b937a576a0cf41b38316368c166cab06f3e44a0a76c451f271.dll
-
Size
6KB
-
MD5
e4a43b9f8b6fc4e5c070e0e166a034b0
-
SHA1
8289c685aab9034702bb755c4f361c1211f6dd39
-
SHA256
4a3dcde9d2c869b937a576a0cf41b38316368c166cab06f3e44a0a76c451f271
-
SHA512
1991ae868bdd5622388d7276df536f883c765ee56f9f46944d7ce44a2a2309d4c165808f3f5b0a1b56f95efe13f1757f3a6d574af566268815fb63216f37ed3a
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7E91Q:nGTWJGp0UZUd6378snt7E91Q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a3dcde9d2c869b937a576a0cf41b38316368c166cab06f3e44a0a76c451f271.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a3dcde9d2c869b937a576a0cf41b38316368c166cab06f3e44a0a76c451f271.dll,#12⤵PID:1724
-