Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
e75c2d4c6fe4d529dd80abb90817f59cfe0b03eeeb18d64f9139b88fe3b2104f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e75c2d4c6fe4d529dd80abb90817f59cfe0b03eeeb18d64f9139b88fe3b2104f.dll
Resource
win10v2004-20220812-en
General
-
Target
e75c2d4c6fe4d529dd80abb90817f59cfe0b03eeeb18d64f9139b88fe3b2104f.dll
-
Size
42KB
-
MD5
037c52d9bd182bcaf75a240daaa0cf6d
-
SHA1
0d9f81166d99fc680d460b98ca94321801d3d8e7
-
SHA256
e75c2d4c6fe4d529dd80abb90817f59cfe0b03eeeb18d64f9139b88fe3b2104f
-
SHA512
c0a097aba9f9cd3b2f2b321607490a69b5c5bbcc2a06c75ec3388982679730a7ea5ce0ac619e51dd6491a814e4a8bde7a9cab597409be3297b5130d812a523a1
-
SSDEEP
768:PC790EsJnYCYkwJ9f0Zc94yNX6ViLArpcnXyFMO1o9Iv:Pk90Lfqh9466GgciFjo2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1520 1196 rundll32.exe 27 PID 1196 wrote to memory of 1520 1196 rundll32.exe 27 PID 1196 wrote to memory of 1520 1196 rundll32.exe 27 PID 1196 wrote to memory of 1520 1196 rundll32.exe 27 PID 1196 wrote to memory of 1520 1196 rundll32.exe 27 PID 1196 wrote to memory of 1520 1196 rundll32.exe 27 PID 1196 wrote to memory of 1520 1196 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e75c2d4c6fe4d529dd80abb90817f59cfe0b03eeeb18d64f9139b88fe3b2104f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e75c2d4c6fe4d529dd80abb90817f59cfe0b03eeeb18d64f9139b88fe3b2104f.dll,#12⤵PID:1520
-