Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 08:56
Static task
static1
Behavioral task
behavioral1
Sample
7ae8738014b0e0562a086bce2678f93b2ca541e9be440b54652ae29a496a9ceb.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7ae8738014b0e0562a086bce2678f93b2ca541e9be440b54652ae29a496a9ceb.dll
Resource
win10v2004-20220812-en
General
-
Target
7ae8738014b0e0562a086bce2678f93b2ca541e9be440b54652ae29a496a9ceb.dll
-
Size
71KB
-
MD5
2330dd4471e6f00b2171cc7264193380
-
SHA1
506d4269c875288098486677752bb2641891f1a2
-
SHA256
7ae8738014b0e0562a086bce2678f93b2ca541e9be440b54652ae29a496a9ceb
-
SHA512
338ecbec18c1456a9e249ad7bd910df1e37a5c17a05896749e04b17b651d4b4f5f5942a6bf9665d4e3252ae50eff4fb9a74e97b30b7529783b55380296d10843
-
SSDEEP
1536:9zNHAaMbFi0tiTv6QckCTMKX4kc5+NrkeP268OjvAz++w:1Ngx8oiz59q/4kc5+NX37jvAz/w
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ae8738014b0e0562a086bce2678f93b2ca541e9be440b54652ae29a496a9ceb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ae8738014b0e0562a086bce2678f93b2ca541e9be440b54652ae29a496a9ceb.dll,#12⤵PID:1496
-