Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
ff58e40f064afe5dd86f394099c2f17c23e8d1b73b811bc1acc382b5804b60bd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff58e40f064afe5dd86f394099c2f17c23e8d1b73b811bc1acc382b5804b60bd.dll
Resource
win10v2004-20221111-en
General
-
Target
ff58e40f064afe5dd86f394099c2f17c23e8d1b73b811bc1acc382b5804b60bd.dll
-
Size
91KB
-
MD5
8c1b8676452c223616f09c86e70a87ca
-
SHA1
72d1eb1791c69b50e525c3dc9d7d6b94b5ebcfd7
-
SHA256
ff58e40f064afe5dd86f394099c2f17c23e8d1b73b811bc1acc382b5804b60bd
-
SHA512
425150e38930f0296b55380ca7864e5889cab6750da818fe40636ec2845cf4e9a3c7b20140f58c1f2a34aa7f0331e61fcdc76d9734cc160bf73223693f3f6a37
-
SSDEEP
1536:NB+aj1oKKkCj/5Prpbk6rPyLtKq2HmZIlzRic9QhqyPx:JaK4PrpbcFUyIRRic9QhqyPx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff58e40f064afe5dd86f394099c2f17c23e8d1b73b811bc1acc382b5804b60bd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff58e40f064afe5dd86f394099c2f17c23e8d1b73b811bc1acc382b5804b60bd.dll,#12⤵PID:1056
-