Analysis
-
max time kernel
5s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 03:15
Static task
static1
Behavioral task
behavioral1
Sample
ea1c7173c7d46e08b97329ce44801c4fe7ce40b3d4bc8cf14325df731f12e608.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea1c7173c7d46e08b97329ce44801c4fe7ce40b3d4bc8cf14325df731f12e608.dll
Resource
win10v2004-20220812-en
General
-
Target
ea1c7173c7d46e08b97329ce44801c4fe7ce40b3d4bc8cf14325df731f12e608.dll
-
Size
137KB
-
MD5
2f76c284e6c564f03322c0d4c07881b0
-
SHA1
e8b3061ca922f72c177e594fd31888adc081c0d9
-
SHA256
ea1c7173c7d46e08b97329ce44801c4fe7ce40b3d4bc8cf14325df731f12e608
-
SHA512
36a78d75084f28b93c8d66e6b2fad278cf1acd7ec20867ad40077ae5dc75be7bb7df95c4e4ea7b05fa7b1f108965ecdfb56d13fe2abe3ea58a5830fb1775f446
-
SSDEEP
3072:q8wA0TMD5Dqg0yN1nvAANSw8ltWoihGCyMOLySWst+fXxh0ILe:q8w6D4Kotup0LWI+fu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1052 1772 rundll32.exe 28 PID 1772 wrote to memory of 1052 1772 rundll32.exe 28 PID 1772 wrote to memory of 1052 1772 rundll32.exe 28 PID 1772 wrote to memory of 1052 1772 rundll32.exe 28 PID 1772 wrote to memory of 1052 1772 rundll32.exe 28 PID 1772 wrote to memory of 1052 1772 rundll32.exe 28 PID 1772 wrote to memory of 1052 1772 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea1c7173c7d46e08b97329ce44801c4fe7ce40b3d4bc8cf14325df731f12e608.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea1c7173c7d46e08b97329ce44801c4fe7ce40b3d4bc8cf14325df731f12e608.dll,#12⤵PID:1052
-