Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
ab1f10aa8153d0e82fdc89d25857010282996a34ca1455f69370077ed51db213.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab1f10aa8153d0e82fdc89d25857010282996a34ca1455f69370077ed51db213.dll
Resource
win10v2004-20220812-en
General
-
Target
ab1f10aa8153d0e82fdc89d25857010282996a34ca1455f69370077ed51db213.dll
-
Size
32KB
-
MD5
fbeffe637f8d34618ee2ed34308e67e0
-
SHA1
e8bdf20647697db3fee4d5b1c09637f4b408ca7f
-
SHA256
ab1f10aa8153d0e82fdc89d25857010282996a34ca1455f69370077ed51db213
-
SHA512
ec8e71749ecaed92dad37e8638f445ec194851d565ed754416a8dc4d9f59f71f96852bd6dac69c1361ee2b04641de40e6d2850b054d3953f06fdb355cb95ddc9
-
SSDEEP
768:DK/ruueBN8nyMfbqx/FI7Glp25hqD5jyRK0ynF:D+ruue4bYa7GPcklyRK0yF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab1f10aa8153d0e82fdc89d25857010282996a34ca1455f69370077ed51db213.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab1f10aa8153d0e82fdc89d25857010282996a34ca1455f69370077ed51db213.dll,#12⤵PID:1120
-