Analysis
-
max time kernel
41s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 05:43
Static task
static1
Behavioral task
behavioral1
Sample
9af59edae2d9755f0a9e6768436242eacde901e10000dfcc8cfbf29c8d72463f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9af59edae2d9755f0a9e6768436242eacde901e10000dfcc8cfbf29c8d72463f.dll
Resource
win10v2004-20221111-en
General
-
Target
9af59edae2d9755f0a9e6768436242eacde901e10000dfcc8cfbf29c8d72463f.dll
-
Size
49KB
-
MD5
cd8ae64a26548e4285f03dbfc03c79c0
-
SHA1
d8ce845fe8cc33850b479be0915f6752894a26b7
-
SHA256
9af59edae2d9755f0a9e6768436242eacde901e10000dfcc8cfbf29c8d72463f
-
SHA512
e7c3303eb7f080744db7499c1203968ea0aca3e437afb77142b2e05e63ea164bbb87994b11554f5dc86eeafb1baecdf0dd83ead64a657e5f70429e0c0aa19cfc
-
SSDEEP
768:dz6aW9P7GUNtUguUsGm3p1DsEo6kEI2pjsC6OAexqCMF+sATjx+2F0m6aQ:dz619z/KgCGm3gl6ndoCRt8F+nTvyZaQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1384 2016 rundll32.exe 28 PID 2016 wrote to memory of 1384 2016 rundll32.exe 28 PID 2016 wrote to memory of 1384 2016 rundll32.exe 28 PID 2016 wrote to memory of 1384 2016 rundll32.exe 28 PID 2016 wrote to memory of 1384 2016 rundll32.exe 28 PID 2016 wrote to memory of 1384 2016 rundll32.exe 28 PID 2016 wrote to memory of 1384 2016 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9af59edae2d9755f0a9e6768436242eacde901e10000dfcc8cfbf29c8d72463f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9af59edae2d9755f0a9e6768436242eacde901e10000dfcc8cfbf29c8d72463f.dll,#12⤵PID:1384
-