Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
7464a49d4cb0a4a716ac34b7b61082f49cd95478e68c283a7d4bdd0868ae2bf2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7464a49d4cb0a4a716ac34b7b61082f49cd95478e68c283a7d4bdd0868ae2bf2.dll
Resource
win10v2004-20221111-en
General
-
Target
7464a49d4cb0a4a716ac34b7b61082f49cd95478e68c283a7d4bdd0868ae2bf2.dll
-
Size
9KB
-
MD5
9b08fc5405d7257712c27e6436c1d1e0
-
SHA1
f1befd02871e8a87c7b28c87e388be5d755aa073
-
SHA256
7464a49d4cb0a4a716ac34b7b61082f49cd95478e68c283a7d4bdd0868ae2bf2
-
SHA512
9f924fbb3457ac711c7dd79e10aedf3059762b7c345a8c10f3905c249cdca9b1b58e78f97c979e820697c7a0a80d2063f3477e61a0702ae05d191fc125215222
-
SSDEEP
192:Enekfu3hME1hMEuCv/ENbSrbFzCcyssPPP7eDPHnx7I3UdIg:EneCMhME1hMEuCv/ENbSF9yDzebHx7aW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27 PID 620 wrote to memory of 1708 620 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7464a49d4cb0a4a716ac34b7b61082f49cd95478e68c283a7d4bdd0868ae2bf2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7464a49d4cb0a4a716ac34b7b61082f49cd95478e68c283a7d4bdd0868ae2bf2.dll,#12⤵PID:1708
-