Analysis
-
max time kernel
2s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
84a10d011c643aaf7d541ca825908c053cf2848255a2294fff059d49a872a53f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
84a10d011c643aaf7d541ca825908c053cf2848255a2294fff059d49a872a53f.dll
Resource
win10v2004-20220901-en
General
-
Target
84a10d011c643aaf7d541ca825908c053cf2848255a2294fff059d49a872a53f.dll
-
Size
32KB
-
MD5
a9b76d37d9d0ae5fda2814bfec046a44
-
SHA1
f25743e58a2a6826b6f9a8efe77458443fa0bf2d
-
SHA256
84a10d011c643aaf7d541ca825908c053cf2848255a2294fff059d49a872a53f
-
SHA512
058a6e537904ab0e32f513bc266a62bb0f4a77563e7bc0a57f8043b3e690d2d46261b50f52b7496616793df197102ee7f7678a336bd8ee59e340d4e1e8fb77ae
-
SSDEEP
384:Apuj39NfuKDQ/BFgbpoVCl8zjOvyzJW77+1O+qXSQG9aFJFrRCRNYY4p:Kujru/O2Ml8zCSW7ADMSZ96BURNYYk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84a10d011c643aaf7d541ca825908c053cf2848255a2294fff059d49a872a53f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84a10d011c643aaf7d541ca825908c053cf2848255a2294fff059d49a872a53f.dll,#12⤵PID:2024
-