Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
9aea25306de56daf10264acd180b914f7603d531cd16df0a4989111e4e125795.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9aea25306de56daf10264acd180b914f7603d531cd16df0a4989111e4e125795.dll
Resource
win10v2004-20220812-en
General
-
Target
9aea25306de56daf10264acd180b914f7603d531cd16df0a4989111e4e125795.dll
-
Size
71KB
-
MD5
86ee0cef5bfc658cf3994c94b3125eeb
-
SHA1
d1cf6351e1b041cf8fdc072e951042b0f4408a37
-
SHA256
9aea25306de56daf10264acd180b914f7603d531cd16df0a4989111e4e125795
-
SHA512
9c614b2d29da9116304b64553db476c9a761ba664f514ceabdbdedd790dfb99b6daee8f8e3d28c62e094b7ff334013e04fcee0eaff7f803918621159045e016c
-
SSDEEP
1536:kmWPtuaQ9TXLuTH3wHFVagYSF7BAEfrFbc7QJfCZsEfvaJEF+9OhUjpy47zi:kmWcnuTXqF8gNF7B1Wzfm40jpTK
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 844 1348 rundll32.exe 27 PID 1348 wrote to memory of 844 1348 rundll32.exe 27 PID 1348 wrote to memory of 844 1348 rundll32.exe 27 PID 1348 wrote to memory of 844 1348 rundll32.exe 27 PID 1348 wrote to memory of 844 1348 rundll32.exe 27 PID 1348 wrote to memory of 844 1348 rundll32.exe 27 PID 1348 wrote to memory of 844 1348 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9aea25306de56daf10264acd180b914f7603d531cd16df0a4989111e4e125795.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9aea25306de56daf10264acd180b914f7603d531cd16df0a4989111e4e125795.dll,#12⤵PID:844
-