Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll
Resource
win10v2004-20220901-en
General
-
Target
b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll
-
Size
32KB
-
MD5
d74a25f7c58349a54018a2dd43030b1e
-
SHA1
31847c1495f8f033587b2e4a65b00378d354f5f1
-
SHA256
b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b
-
SHA512
57b6885a28476ee430155a144601a2e6c62f99e4c9ccdc799d4d863cf3952dbda8bb18c11c7771063314ae48c3875498688cf1a9b647a0089bb7f4fed26cf40d
-
SSDEEP
768:VqDM46EjQVubGebbo6H1HA8mj5H0P8sHX0tz:QDM46EjQVuyeI6VgnZU8kkz
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27 PID 1444 wrote to memory of 1948 1444 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll,#12⤵PID:1948
-