Analysis
-
max time kernel
30s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 02:58
Static task
static1
Behavioral task
behavioral1
Sample
f105650a53241345780b857a3d86cd6f88221eeb1e5da3764aa5f6e3973987a1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f105650a53241345780b857a3d86cd6f88221eeb1e5da3764aa5f6e3973987a1.dll
Resource
win10v2004-20220812-en
General
-
Target
f105650a53241345780b857a3d86cd6f88221eeb1e5da3764aa5f6e3973987a1.dll
-
Size
12KB
-
MD5
af8c173d42d5a7a9c7397255524c16a5
-
SHA1
8735265aa85110b204a1aea2f51957f6f9ba385d
-
SHA256
f105650a53241345780b857a3d86cd6f88221eeb1e5da3764aa5f6e3973987a1
-
SHA512
5db11114572721a887663df5beff34b240978f24f60daceaf2acfebe685f6fe794ed28136ed5ce823a187001cc1961724b918224bb6d11d2f8201f64f64e7ac5
-
SSDEEP
192:W6walJeW9XBauQUA6/fnBH8UMTlBVg/VBZgPhbhlgG:W9afeaxuUl58dBVwBObbgG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1944 2032 rundll32.exe 28 PID 2032 wrote to memory of 1944 2032 rundll32.exe 28 PID 2032 wrote to memory of 1944 2032 rundll32.exe 28 PID 2032 wrote to memory of 1944 2032 rundll32.exe 28 PID 2032 wrote to memory of 1944 2032 rundll32.exe 28 PID 2032 wrote to memory of 1944 2032 rundll32.exe 28 PID 2032 wrote to memory of 1944 2032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f105650a53241345780b857a3d86cd6f88221eeb1e5da3764aa5f6e3973987a1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f105650a53241345780b857a3d86cd6f88221eeb1e5da3764aa5f6e3973987a1.dll,#12⤵PID:1944
-