Analysis
-
max time kernel
47s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
e32c7460fb150d81eb2a7d40f2448eea27734e59093f93b30b25e7aca49e96cd.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e32c7460fb150d81eb2a7d40f2448eea27734e59093f93b30b25e7aca49e96cd.dll
Resource
win10v2004-20220812-en
General
-
Target
e32c7460fb150d81eb2a7d40f2448eea27734e59093f93b30b25e7aca49e96cd.dll
-
Size
336KB
-
MD5
1687934ddea5a1ec08f7dfd7b7726b30
-
SHA1
5311a882b56d9047e516479ba2560893d928e374
-
SHA256
e32c7460fb150d81eb2a7d40f2448eea27734e59093f93b30b25e7aca49e96cd
-
SHA512
b44726acf72d57a4d9275d6bc9871b0369fe1698dd5f5ae1d654e4999ec2ec8768fde2df98f2666dc8abad6384c5745ba5c77143a93cac828d74233c47f77174
-
SSDEEP
6144:QxBYHJBZqt/b22JtxuINqHd3wbna3G+PtRBvTcbPgK8IfRF6Rsn0s981WenZhD:QXA0ty2zZU93wbnanPtDbm4mR5RInZhD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1696 1744 rundll32.exe 28 PID 1744 wrote to memory of 1696 1744 rundll32.exe 28 PID 1744 wrote to memory of 1696 1744 rundll32.exe 28 PID 1744 wrote to memory of 1696 1744 rundll32.exe 28 PID 1744 wrote to memory of 1696 1744 rundll32.exe 28 PID 1744 wrote to memory of 1696 1744 rundll32.exe 28 PID 1744 wrote to memory of 1696 1744 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e32c7460fb150d81eb2a7d40f2448eea27734e59093f93b30b25e7aca49e96cd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e32c7460fb150d81eb2a7d40f2448eea27734e59093f93b30b25e7aca49e96cd.dll,#12⤵PID:1696
-