Analysis
-
max time kernel
6s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 03:07
Static task
static1
Behavioral task
behavioral1
Sample
ed63bcc77113d37e6fb6cf111afd33a6fd8b9a3608546295313449316241442a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed63bcc77113d37e6fb6cf111afd33a6fd8b9a3608546295313449316241442a.dll
Resource
win10v2004-20221111-en
General
-
Target
ed63bcc77113d37e6fb6cf111afd33a6fd8b9a3608546295313449316241442a.dll
-
Size
137KB
-
MD5
52f60537dad4dbbea069930a11127440
-
SHA1
935b658b6ce3eab31d7776b02c556dce73f6a1c0
-
SHA256
ed63bcc77113d37e6fb6cf111afd33a6fd8b9a3608546295313449316241442a
-
SHA512
939a9f57c142b5007e4912dbf88efc14b2d0b6fbe53cb733237770b5531eaf5126cb305f5a7b5d5d8d4c0c8ea794dd8bd1f1ab885ed1fc9361c0e61a81344529
-
SSDEEP
3072:q8wA0TMD5Dqg0yN1nvAANSw8ltWoihGCyMOLySWst+fXx20ILV:q8w6D4Kotup0LWI+fc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1748 1320 rundll32.exe 28 PID 1320 wrote to memory of 1748 1320 rundll32.exe 28 PID 1320 wrote to memory of 1748 1320 rundll32.exe 28 PID 1320 wrote to memory of 1748 1320 rundll32.exe 28 PID 1320 wrote to memory of 1748 1320 rundll32.exe 28 PID 1320 wrote to memory of 1748 1320 rundll32.exe 28 PID 1320 wrote to memory of 1748 1320 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed63bcc77113d37e6fb6cf111afd33a6fd8b9a3608546295313449316241442a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed63bcc77113d37e6fb6cf111afd33a6fd8b9a3608546295313449316241442a.dll,#12⤵PID:1748
-