Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
be60b2a1225465466506f2c27a35ef1f35c2a673921a1a8f43b2827f4c3e235d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be60b2a1225465466506f2c27a35ef1f35c2a673921a1a8f43b2827f4c3e235d.dll
Resource
win10v2004-20220812-en
General
-
Target
be60b2a1225465466506f2c27a35ef1f35c2a673921a1a8f43b2827f4c3e235d.dll
-
Size
204KB
-
MD5
1b0d5fb1f07aa608ea7c7e6895bb7520
-
SHA1
fbf1936eb2df4608ec9de2d82f21eeb68d40a482
-
SHA256
be60b2a1225465466506f2c27a35ef1f35c2a673921a1a8f43b2827f4c3e235d
-
SHA512
5c03ec46ce219d19ad45db8a9abeac41bc9330eb0a554c96a122d785a755052c556912092c16f85d837f39c507175d8bd6ec8cc11e03227afbb358dff7ab3303
-
SSDEEP
3072:sKjnJ0d31OVJ3LNacyBDSSgOB9xCAdLoGBNb/jfD9F3kzFDlpIBdE39:sKi38JbshS5OB7fb/j77kZodEN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2024 2032 rundll32.exe 28 PID 2032 wrote to memory of 2024 2032 rundll32.exe 28 PID 2032 wrote to memory of 2024 2032 rundll32.exe 28 PID 2032 wrote to memory of 2024 2032 rundll32.exe 28 PID 2032 wrote to memory of 2024 2032 rundll32.exe 28 PID 2032 wrote to memory of 2024 2032 rundll32.exe 28 PID 2032 wrote to memory of 2024 2032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be60b2a1225465466506f2c27a35ef1f35c2a673921a1a8f43b2827f4c3e235d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be60b2a1225465466506f2c27a35ef1f35c2a673921a1a8f43b2827f4c3e235d.dll,#12⤵PID:2024
-