Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
aefe596963230d33cd56b2098b2deb1073566f1b9027140b657371204b9ba5c2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aefe596963230d33cd56b2098b2deb1073566f1b9027140b657371204b9ba5c2.dll
Resource
win10v2004-20220812-en
General
-
Target
aefe596963230d33cd56b2098b2deb1073566f1b9027140b657371204b9ba5c2.dll
-
Size
20KB
-
MD5
f3ca5e899fc83013f3098d9cce52480a
-
SHA1
bbb6cd79381a3a44f66cc34af81424dbecf37366
-
SHA256
aefe596963230d33cd56b2098b2deb1073566f1b9027140b657371204b9ba5c2
-
SHA512
cdd8b060c7be837d0f35994b18e7683104289a23272a65fc8c1e28c87b2c9d4dafde363b85c1e2fdc19bdcc7c7d6d090138e31b22f5b3b4b304b17a395910c8b
-
SSDEEP
384:zSG/2Jp+C6QhtmruxCcdIL+0XplsCAu8UaWHuqaTlX0wG:zfYh2oCtpXPsx2OqaewG
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1240 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1240 1204 rundll32.exe 28 PID 1204 wrote to memory of 1240 1204 rundll32.exe 28 PID 1204 wrote to memory of 1240 1204 rundll32.exe 28 PID 1204 wrote to memory of 1240 1204 rundll32.exe 28 PID 1204 wrote to memory of 1240 1204 rundll32.exe 28 PID 1204 wrote to memory of 1240 1204 rundll32.exe 28 PID 1204 wrote to memory of 1240 1204 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aefe596963230d33cd56b2098b2deb1073566f1b9027140b657371204b9ba5c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aefe596963230d33cd56b2098b2deb1073566f1b9027140b657371204b9ba5c2.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-