Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
e8c5e937aa9f7bf1d839c59c873181327c48acf3800e240e4c84f742d06d1a54.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8c5e937aa9f7bf1d839c59c873181327c48acf3800e240e4c84f742d06d1a54.dll
Resource
win10v2004-20220812-en
General
-
Target
e8c5e937aa9f7bf1d839c59c873181327c48acf3800e240e4c84f742d06d1a54.dll
-
Size
648KB
-
MD5
5cd6ca0597f4751f635876721f437acb
-
SHA1
14147df0054b15d5a214c43e48041517afa201ec
-
SHA256
e8c5e937aa9f7bf1d839c59c873181327c48acf3800e240e4c84f742d06d1a54
-
SHA512
093bc003a05bf65422a315ee9e93edec78138493281e5646f27ded72b5b94273699c43e0ba6f44fb1cb5a69964c6796b2a77568d12ecb57d3bd9de6bdd67ee88
-
SSDEEP
12288:w8TzPGFLjWdE4hrndQ2StZIzZkBhoQt7jv1QaT2RFgXd:jTy5oEcndQ2S/IzGkIv1vTuFgXd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8c5e937aa9f7bf1d839c59c873181327c48acf3800e240e4c84f742d06d1a54.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8c5e937aa9f7bf1d839c59c873181327c48acf3800e240e4c84f742d06d1a54.dll,#12⤵PID:1708
-