Analysis
-
max time kernel
2s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 21:48
Static task
static1
Behavioral task
behavioral1
Sample
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll
Resource
win10v2004-20220901-en
General
-
Target
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll
-
Size
6KB
-
MD5
e524a2bb032689d9c526241f3a6c1720
-
SHA1
e7c37569eade6a271d163ea269958b6596f83d3f
-
SHA256
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889
-
SHA512
e2930344cbfc7c9500f96a56b6587d805e80c14a9f8bc3d8cb98bd60b7549a2f05b02c20a5b4f377a952e54eb4bc8f5524ecc83632e1f33dca2f662448dad4f8
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHh1HIkxG3xE4G9oiU6zy:nEY2RrF1eqwi4jHIkxG3xE4G9oiU6zy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1104 wrote to memory of 972 1104 rundll32.exe 28 PID 1104 wrote to memory of 972 1104 rundll32.exe 28 PID 1104 wrote to memory of 972 1104 rundll32.exe 28 PID 1104 wrote to memory of 972 1104 rundll32.exe 28 PID 1104 wrote to memory of 972 1104 rundll32.exe 28 PID 1104 wrote to memory of 972 1104 rundll32.exe 28 PID 1104 wrote to memory of 972 1104 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll,#12⤵PID:972
-