Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
82f0ac242b9f9fdd4367517f1751cd785d42012d5d0eac92ef3a736fd3279655.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82f0ac242b9f9fdd4367517f1751cd785d42012d5d0eac92ef3a736fd3279655.dll
Resource
win10v2004-20220812-en
General
-
Target
82f0ac242b9f9fdd4367517f1751cd785d42012d5d0eac92ef3a736fd3279655.dll
-
Size
9KB
-
MD5
84297de828a1b71d352785d8b55e3e80
-
SHA1
3cbfa6fd27f877b223cfae95385bfa53fb739b39
-
SHA256
82f0ac242b9f9fdd4367517f1751cd785d42012d5d0eac92ef3a736fd3279655
-
SHA512
b3566b70a1fd46d52e3d75a322f59147e5cc6865f016af72242110900ab6a948044252e900593b9f8a5be145e7c4d7eb7895ade8e2a25b5da76f9590447c1b86
-
SSDEEP
192:Enekfu3hME1hMEuCv/ENbSrbFzCcyssPPP7eDPHnx7Iub:EneCMhME1hMEuCv/ENbSF9yDzebHx7/b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1324 1644 rundll32.exe 28 PID 1644 wrote to memory of 1324 1644 rundll32.exe 28 PID 1644 wrote to memory of 1324 1644 rundll32.exe 28 PID 1644 wrote to memory of 1324 1644 rundll32.exe 28 PID 1644 wrote to memory of 1324 1644 rundll32.exe 28 PID 1644 wrote to memory of 1324 1644 rundll32.exe 28 PID 1644 wrote to memory of 1324 1644 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82f0ac242b9f9fdd4367517f1751cd785d42012d5d0eac92ef3a736fd3279655.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82f0ac242b9f9fdd4367517f1751cd785d42012d5d0eac92ef3a736fd3279655.dll,#12⤵PID:1324
-