Analysis
-
max time kernel
25s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
69c0543871c550ac61e30e630bcb5c56b106c2429460d14ce54f715280726cd7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69c0543871c550ac61e30e630bcb5c56b106c2429460d14ce54f715280726cd7.dll
Resource
win10v2004-20221111-en
General
-
Target
69c0543871c550ac61e30e630bcb5c56b106c2429460d14ce54f715280726cd7.dll
-
Size
16KB
-
MD5
a444f326e28839cb41edccb4dee734f0
-
SHA1
21756e238296add9820df8cbec7c5e66977128ab
-
SHA256
69c0543871c550ac61e30e630bcb5c56b106c2429460d14ce54f715280726cd7
-
SHA512
8cfeb058b344ab7daf95f193e8d8c17f8cbe72509f729c652d953316e6ce4aa22ea03c05fc38ff7eec1e324c3d6f2e7b8751df225030d8a7a4abf14b545a0cb9
-
SSDEEP
192:WKLj69QGG41Ci7aVhU3fXGXFIiDZuCpcZWEa6Aap+uQInhc7h6HulogKk07+v4hH:0CG/x7aCX+NuCpcZva6zjQKHuqS01h
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69c0543871c550ac61e30e630bcb5c56b106c2429460d14ce54f715280726cd7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69c0543871c550ac61e30e630bcb5c56b106c2429460d14ce54f715280726cd7.dll,#12⤵PID:1732
-