Analysis
-
max time kernel
228s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 00:26
Behavioral task
behavioral1
Sample
24438ddb8521de7a48966512364466ccdcea7267f49d332d8f2bcb6f925c9b9a.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
24438ddb8521de7a48966512364466ccdcea7267f49d332d8f2bcb6f925c9b9a.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
24438ddb8521de7a48966512364466ccdcea7267f49d332d8f2bcb6f925c9b9a.dll
-
Size
63KB
-
MD5
f88dfccb14ae2ab988a40edcf7156830
-
SHA1
baca4c5c6be07e4e53f2b09f5d505836ad95eab9
-
SHA256
24438ddb8521de7a48966512364466ccdcea7267f49d332d8f2bcb6f925c9b9a
-
SHA512
685366c1fe801a2ae0a4f4b4645ffa135f1a49dd15121e9ef4bf8fdcf8e12218755919462ba915c92328219c1c519ebdc78cfebf53a5ce9f37bdd65872834727
-
SSDEEP
1536:n7ZLNPp9pZBM9xXzPN3NWOOLLQhuN3Ii/nu3EY2WR+NvA9kSw:7ZppAXh38OO/IuN3ImQvR+1A9kR
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1648 wrote to memory of 556 1648 rundll32.exe 28 PID 1648 wrote to memory of 556 1648 rundll32.exe 28 PID 1648 wrote to memory of 556 1648 rundll32.exe 28 PID 1648 wrote to memory of 556 1648 rundll32.exe 28 PID 1648 wrote to memory of 556 1648 rundll32.exe 28 PID 1648 wrote to memory of 556 1648 rundll32.exe 28 PID 1648 wrote to memory of 556 1648 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24438ddb8521de7a48966512364466ccdcea7267f49d332d8f2bcb6f925c9b9a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24438ddb8521de7a48966512364466ccdcea7267f49d332d8f2bcb6f925c9b9a.dll,#12⤵PID:556
-