Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
b55de0f0fb87c0eeadca09bd3350055e2b9672301f352d7f9cd58be7db955715.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b55de0f0fb87c0eeadca09bd3350055e2b9672301f352d7f9cd58be7db955715.dll
Resource
win10v2004-20220812-en
General
-
Target
b55de0f0fb87c0eeadca09bd3350055e2b9672301f352d7f9cd58be7db955715.dll
-
Size
9KB
-
MD5
03f504772d4322dcb6d98af61cc02780
-
SHA1
63773048c66586e7d7313c14a1f41688d05e6a08
-
SHA256
b55de0f0fb87c0eeadca09bd3350055e2b9672301f352d7f9cd58be7db955715
-
SHA512
2a4a8c065d4c96acb5d1895afd172e0b2fddab3e79a3fb49c238e91b70e4e622658a7b152fb5fc7eab36350afbefa613e0facd140f7011751782b57c7a26def1
-
SSDEEP
192:Enekfu3hME1hMEuCv/ENbSrbFzCcyssPPP7eDPHnx7I3Xy/+:EneCMhME1hMEuCv/ENbSF9yDzebHx7G
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2044 1184 rundll32.exe 20 PID 1184 wrote to memory of 2044 1184 rundll32.exe 20 PID 1184 wrote to memory of 2044 1184 rundll32.exe 20 PID 1184 wrote to memory of 2044 1184 rundll32.exe 20 PID 1184 wrote to memory of 2044 1184 rundll32.exe 20 PID 1184 wrote to memory of 2044 1184 rundll32.exe 20 PID 1184 wrote to memory of 2044 1184 rundll32.exe 20
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b55de0f0fb87c0eeadca09bd3350055e2b9672301f352d7f9cd58be7db955715.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b55de0f0fb87c0eeadca09bd3350055e2b9672301f352d7f9cd58be7db955715.dll,#12⤵PID:2044
-