Analysis
-
max time kernel
55s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 21:53
Static task
static1
Behavioral task
behavioral1
Sample
85006fbc1efcd3616fd5c7385760df873b6bd4ebf0e2905a0989390002a49a61.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85006fbc1efcd3616fd5c7385760df873b6bd4ebf0e2905a0989390002a49a61.dll
Resource
win10v2004-20221111-en
General
-
Target
85006fbc1efcd3616fd5c7385760df873b6bd4ebf0e2905a0989390002a49a61.dll
-
Size
5KB
-
MD5
0b65fa3f42ddef8afefd8e6b16887fc0
-
SHA1
ed29d4fee95e4e83e8e877187c4f21f1e6dab200
-
SHA256
85006fbc1efcd3616fd5c7385760df873b6bd4ebf0e2905a0989390002a49a61
-
SHA512
3e7a2a6020f6251a371f960f6cb4d40deb7dccbd4c6cbc9574e9a57ffc86c369923cfe0089d016d95cf11d1371f6a967bd0b71d063213e7a002b1d14850a7e28
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhfSL8SmBS7SbO+96:nEY2RrF1eqwi4RSL8SYS7Sb196
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 304 wrote to memory of 1144 304 rundll32.exe 27 PID 304 wrote to memory of 1144 304 rundll32.exe 27 PID 304 wrote to memory of 1144 304 rundll32.exe 27 PID 304 wrote to memory of 1144 304 rundll32.exe 27 PID 304 wrote to memory of 1144 304 rundll32.exe 27 PID 304 wrote to memory of 1144 304 rundll32.exe 27 PID 304 wrote to memory of 1144 304 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85006fbc1efcd3616fd5c7385760df873b6bd4ebf0e2905a0989390002a49a61.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85006fbc1efcd3616fd5c7385760df873b6bd4ebf0e2905a0989390002a49a61.dll,#12⤵PID:1144
-