Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 15:41
Static task
static1
Behavioral task
behavioral1
Sample
95e7b438743b6529a98ecac4a36bdf746c4a7924e33bc1a2a4e1dc2d323c82e8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95e7b438743b6529a98ecac4a36bdf746c4a7924e33bc1a2a4e1dc2d323c82e8.dll
Resource
win10v2004-20220812-en
General
-
Target
95e7b438743b6529a98ecac4a36bdf746c4a7924e33bc1a2a4e1dc2d323c82e8.dll
-
Size
157KB
-
MD5
443d3f59cfeca3319e6a6717c03af0f7
-
SHA1
7debb6d4f0706596285df9aa185fc651725a5f45
-
SHA256
95e7b438743b6529a98ecac4a36bdf746c4a7924e33bc1a2a4e1dc2d323c82e8
-
SHA512
20da5a76ef9369d23d1de3f51d87b86376335ed060e881ff600a0e752c4e19e1cdbb1c00a2becd2633e7ea88f3ec8bf293a5e79b5abf6d7a6fda2803cf29cf58
-
SSDEEP
3072:hbPtFEsxJm60O+iyU34G8NTixOoZhnrloXZrf97IycEo1PzLx:hbfEsxJmlxip3Z8NT1oZBloX5ftEtRnx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 896 wrote to memory of 1108 896 rundll32.exe 27 PID 896 wrote to memory of 1108 896 rundll32.exe 27 PID 896 wrote to memory of 1108 896 rundll32.exe 27 PID 896 wrote to memory of 1108 896 rundll32.exe 27 PID 896 wrote to memory of 1108 896 rundll32.exe 27 PID 896 wrote to memory of 1108 896 rundll32.exe 27 PID 896 wrote to memory of 1108 896 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95e7b438743b6529a98ecac4a36bdf746c4a7924e33bc1a2a4e1dc2d323c82e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95e7b438743b6529a98ecac4a36bdf746c4a7924e33bc1a2a4e1dc2d323c82e8.dll,#12⤵PID:1108
-