Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:14
Behavioral task
behavioral1
Sample
219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll
-
Size
69KB
-
MD5
5bb8ffdcffeb2cb29a5b294c7d8bba2f
-
SHA1
53938777be7ec4d9b1b050d260485ab4c8ecd07f
-
SHA256
219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47
-
SHA512
4df5c16de5e23ec77e2f71e2fdf842ba1111875cecb69494b28f6644e7645ce1814a019271f2fddffeeb6314c55ea66c4d8a24ee1d90920f89f6fbd9fc9324f8
-
SSDEEP
1536:Bm1NGJVGk5DToMUtfLw/MiBROzkejqFP75xGo1/qp84:kX0VtTopLwUiBvejQP7jP1Cp84
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll,#12⤵PID:1340
-