Analysis
-
max time kernel
227s -
max time network
332s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
f283523a4c377c91a481e80bb325b4940e60e62b61be0a8ff2e90ae8e14f7f87.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f283523a4c377c91a481e80bb325b4940e60e62b61be0a8ff2e90ae8e14f7f87.dll
Resource
win10v2004-20220901-en
General
-
Target
f283523a4c377c91a481e80bb325b4940e60e62b61be0a8ff2e90ae8e14f7f87.dll
-
Size
52KB
-
MD5
4aa0fb64a74267af86118d2cce269880
-
SHA1
30502687a023f93912fa231b4b1049dfe9918a55
-
SHA256
f283523a4c377c91a481e80bb325b4940e60e62b61be0a8ff2e90ae8e14f7f87
-
SHA512
97d8b8a15619b0232fdb1e6355e2d2e04e1868a0240376fcc67181a59a938f0188284e02014daffdf10e93fd8f4c1138bd5999f3d11944c4173bb93d3cc079a9
-
SSDEEP
384:SRgkYD/oaTYTJpk5Oxn4xZ6+R/z6uYkai10gtsVBIJKdPAmp7/Unk1SoDNxcoV8w:nkUQPk56JuYkB6gtsEgdPA64k9cS8Cj
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1492 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 520 wrote to memory of 1492 520 rundll32.exe 28 PID 520 wrote to memory of 1492 520 rundll32.exe 28 PID 520 wrote to memory of 1492 520 rundll32.exe 28 PID 520 wrote to memory of 1492 520 rundll32.exe 28 PID 520 wrote to memory of 1492 520 rundll32.exe 28 PID 520 wrote to memory of 1492 520 rundll32.exe 28 PID 520 wrote to memory of 1492 520 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f283523a4c377c91a481e80bb325b4940e60e62b61be0a8ff2e90ae8e14f7f87.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f283523a4c377c91a481e80bb325b4940e60e62b61be0a8ff2e90ae8e14f7f87.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-