Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
c07f7d356abb795410b91e48493b9d3711ccf48404c5b5188dccc2016ac4c816.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c07f7d356abb795410b91e48493b9d3711ccf48404c5b5188dccc2016ac4c816.dll
Resource
win10v2004-20220901-en
General
-
Target
c07f7d356abb795410b91e48493b9d3711ccf48404c5b5188dccc2016ac4c816.dll
-
Size
5KB
-
MD5
818eaf73ec174019bd867a96c268bcd0
-
SHA1
578e778e57e64f4e4076dd8106e09ac8162f2b9a
-
SHA256
c07f7d356abb795410b91e48493b9d3711ccf48404c5b5188dccc2016ac4c816
-
SHA512
d3c433dedc618c3cdda4faf63e00c586d27b4b44c9894f2d7342cad3a2bdd9dab7b31b8e3bce25020347002c359ec593e3af9abe3fe7f0021334a9947f5ae5e9
-
SSDEEP
48:q0aaPO8jGSLIv+Tqq7NqrhWR07iIsitl6YtDytJFgOrnsB/SsyomXrpf1D45e7PL:1h9jTqMMrY0OI/KYyznSMDDfL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1604 1488 rundll32.exe 28 PID 1488 wrote to memory of 1604 1488 rundll32.exe 28 PID 1488 wrote to memory of 1604 1488 rundll32.exe 28 PID 1488 wrote to memory of 1604 1488 rundll32.exe 28 PID 1488 wrote to memory of 1604 1488 rundll32.exe 28 PID 1488 wrote to memory of 1604 1488 rundll32.exe 28 PID 1488 wrote to memory of 1604 1488 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c07f7d356abb795410b91e48493b9d3711ccf48404c5b5188dccc2016ac4c816.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c07f7d356abb795410b91e48493b9d3711ccf48404c5b5188dccc2016ac4c816.dll,#12⤵PID:1604
-