Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
900e64886ff61852457dd8d02dc9bb803113fc636eac0496a82f94dc03e09329.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
900e64886ff61852457dd8d02dc9bb803113fc636eac0496a82f94dc03e09329.dll
Resource
win10v2004-20220812-en
General
-
Target
900e64886ff61852457dd8d02dc9bb803113fc636eac0496a82f94dc03e09329.dll
-
Size
92KB
-
MD5
5b1f15d67c9b3fcedd9609beec12dd5d
-
SHA1
6a08ca46e830fca685a80652d6f448a5964e01b9
-
SHA256
900e64886ff61852457dd8d02dc9bb803113fc636eac0496a82f94dc03e09329
-
SHA512
678c294f906c8ece03f57b211a7f0f97e96bd84baaab592522f9193984f3c38d2134b6f8d974c877805b7463513373046c1b018a6187dc63980ed189a40fabb4
-
SSDEEP
1536:eK8VgkTrExQIeT6jrhueSqBBZSHPRFByi5oRy592GU1lGM+GiSLoSfsFcT:eK8+k3E59jrhysfSHPRVEy59bvM+nCo2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1656 1620 rundll32.exe 28 PID 1620 wrote to memory of 1656 1620 rundll32.exe 28 PID 1620 wrote to memory of 1656 1620 rundll32.exe 28 PID 1620 wrote to memory of 1656 1620 rundll32.exe 28 PID 1620 wrote to memory of 1656 1620 rundll32.exe 28 PID 1620 wrote to memory of 1656 1620 rundll32.exe 28 PID 1620 wrote to memory of 1656 1620 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\900e64886ff61852457dd8d02dc9bb803113fc636eac0496a82f94dc03e09329.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\900e64886ff61852457dd8d02dc9bb803113fc636eac0496a82f94dc03e09329.dll,#12⤵PID:1656
-