Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
8dde8caa3d0d54f9d34cee8915962455c8e2b19020ca9c5da03702f680d3165f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8dde8caa3d0d54f9d34cee8915962455c8e2b19020ca9c5da03702f680d3165f.dll
Resource
win10v2004-20220901-en
General
-
Target
8dde8caa3d0d54f9d34cee8915962455c8e2b19020ca9c5da03702f680d3165f.dll
-
Size
5KB
-
MD5
b0846b7e4ea4b5cd08b5dadb785458b0
-
SHA1
a4e5ff884371f062ef62080439fac5fbb7652628
-
SHA256
8dde8caa3d0d54f9d34cee8915962455c8e2b19020ca9c5da03702f680d3165f
-
SHA512
3f0d835e6d0fdbe6250add3320a2f5997327b6f4b752602ab6e0ba871b1dc6759053c3612e38d0e0d61749c7b5429e81c65d2128d080a682f3533dfb65c77555
-
SSDEEP
48:SWkO0IoyTnXz+ihZjokjYLoFrVMnuQ5K3HTjj67yKCEMT:ZJTnXzvokjh5VM6DjtdT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1692 1900 rundll32.exe 27 PID 1900 wrote to memory of 1692 1900 rundll32.exe 27 PID 1900 wrote to memory of 1692 1900 rundll32.exe 27 PID 1900 wrote to memory of 1692 1900 rundll32.exe 27 PID 1900 wrote to memory of 1692 1900 rundll32.exe 27 PID 1900 wrote to memory of 1692 1900 rundll32.exe 27 PID 1900 wrote to memory of 1692 1900 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dde8caa3d0d54f9d34cee8915962455c8e2b19020ca9c5da03702f680d3165f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dde8caa3d0d54f9d34cee8915962455c8e2b19020ca9c5da03702f680d3165f.dll,#12⤵PID:1692
-