Analysis
-
max time kernel
4s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 06:01
Static task
static1
Behavioral task
behavioral1
Sample
befaeb429b5518a31237b5f91c0e59e120c325043ce567c436010427f0edf336.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
befaeb429b5518a31237b5f91c0e59e120c325043ce567c436010427f0edf336.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
befaeb429b5518a31237b5f91c0e59e120c325043ce567c436010427f0edf336.dll
-
Size
56KB
-
MD5
bb79e12b309656702e9662dd2108dc3f
-
SHA1
0493ab5552a8ade6ebd19793bfa98d72c2a104d9
-
SHA256
befaeb429b5518a31237b5f91c0e59e120c325043ce567c436010427f0edf336
-
SHA512
20d2e50e74348a8c60991eda798458022da94ee238d7eec81e5fd22bc7aa65d3f4057fcee3bdbce0193f3c2d6c54ad18e65539adaaec46fa26a148540f92e04e
-
SSDEEP
1536:3DqG7zD8bqQ8HZZ9NbQwtKo28bFmd0Fg:3DqGr8bq5nNBtKopmdc
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28 PID 1420 wrote to memory of 2024 1420 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\befaeb429b5518a31237b5f91c0e59e120c325043ce567c436010427f0edf336.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\befaeb429b5518a31237b5f91c0e59e120c325043ce567c436010427f0edf336.dll,#12⤵PID:2024
-