Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 00:04
Static task
static1
Behavioral task
behavioral1
Sample
72a4a5ffeab8dfb39c0b0e1b44d2bc050278df9178ab7ab4a4cb9efb03a55b6c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
72a4a5ffeab8dfb39c0b0e1b44d2bc050278df9178ab7ab4a4cb9efb03a55b6c.dll
Resource
win10v2004-20220901-en
General
-
Target
72a4a5ffeab8dfb39c0b0e1b44d2bc050278df9178ab7ab4a4cb9efb03a55b6c.dll
-
Size
5KB
-
MD5
811370f16006132fe500eb213bfa8560
-
SHA1
d71eca0b002a3b674271dc67c7d4cbc7ed69713f
-
SHA256
72a4a5ffeab8dfb39c0b0e1b44d2bc050278df9178ab7ab4a4cb9efb03a55b6c
-
SHA512
ef4da616d1d003e35277f4094d064296bb0514019d54e40af0d33623e2e58d50bc3e555c33da4d02ab7685d027cf084b1057c2b3c13c24f27bdfc52b2dad4720
-
SSDEEP
48:q0aaPO8jGSLIv+Tqq7NqrhWR07iIsitl6YtDytJFgOrnsB/SsyomXrcOyQe:1h9jTqMMrY0OI/KYyznSMQOyQe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1356 1256 rundll32.exe 26 PID 1256 wrote to memory of 1356 1256 rundll32.exe 26 PID 1256 wrote to memory of 1356 1256 rundll32.exe 26 PID 1256 wrote to memory of 1356 1256 rundll32.exe 26 PID 1256 wrote to memory of 1356 1256 rundll32.exe 26 PID 1256 wrote to memory of 1356 1256 rundll32.exe 26 PID 1256 wrote to memory of 1356 1256 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72a4a5ffeab8dfb39c0b0e1b44d2bc050278df9178ab7ab4a4cb9efb03a55b6c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72a4a5ffeab8dfb39c0b0e1b44d2bc050278df9178ab7ab4a4cb9efb03a55b6c.dll,#12⤵PID:1356
-