Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:30
Behavioral task
behavioral1
Sample
67f33e4ee74c65902a67a0c302525254427b000c1ebd54d18d2d2be18a9a0635.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
67f33e4ee74c65902a67a0c302525254427b000c1ebd54d18d2d2be18a9a0635.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
67f33e4ee74c65902a67a0c302525254427b000c1ebd54d18d2d2be18a9a0635.dll
-
Size
57KB
-
MD5
5a0716d574e4e5962c9bef3bc36bc5fc
-
SHA1
63e72ad0951d82e7c41cd6dc576276b9bf267371
-
SHA256
67f33e4ee74c65902a67a0c302525254427b000c1ebd54d18d2d2be18a9a0635
-
SHA512
28107862ff02858608383c77b40195c2fc292a70d6aeec734cc751e34ad3cb8650521e690361b8d943c5590abee8af5209a1e537eecee231da4610fd457ab767
-
SSDEEP
1536:e6PViKUP+lOgB2JkclXNG80PU3cWKBTaYMLb1tG23om:RViKUPWjB2zlXNpCU3cZWYEH7
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27 PID 1720 wrote to memory of 1300 1720 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67f33e4ee74c65902a67a0c302525254427b000c1ebd54d18d2d2be18a9a0635.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67f33e4ee74c65902a67a0c302525254427b000c1ebd54d18d2d2be18a9a0635.dll,#12⤵PID:1300
-