Analysis
-
max time kernel
39s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:52
Behavioral task
behavioral1
Sample
025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll
-
Size
63KB
-
MD5
5a070f69485cf50b21055348d7f17e14
-
SHA1
82c5520926af77755f2086e3f411616a7c081a9b
-
SHA256
025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa
-
SHA512
c86c5619913c8b667e131551773abb39c4d6e184f29803f211d7b7e97ac8277b2a3eb7e394617be3e67b9fb4fac5f61eeb76bda9dc9feab0c1ca6a957f268bc9
-
SSDEEP
1536:UiFmLzKazhaMh3P9qsXKsW+suE96lPDtxCaTmUz6bC:UzzKmjlqsxW+sJklJxCa96bC
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1004 wrote to memory of 1144 1004 rundll32.exe 28 PID 1004 wrote to memory of 1144 1004 rundll32.exe 28 PID 1004 wrote to memory of 1144 1004 rundll32.exe 28 PID 1004 wrote to memory of 1144 1004 rundll32.exe 28 PID 1004 wrote to memory of 1144 1004 rundll32.exe 28 PID 1004 wrote to memory of 1144 1004 rundll32.exe 28 PID 1004 wrote to memory of 1144 1004 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll,#12⤵PID:1144
-