Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 09:36
Behavioral task
behavioral1
Sample
f334c443791705443c9ab486d012b136b987caaa51d1bb41a698d8ec3c60ca04.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f334c443791705443c9ab486d012b136b987caaa51d1bb41a698d8ec3c60ca04.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
f334c443791705443c9ab486d012b136b987caaa51d1bb41a698d8ec3c60ca04.dll
-
Size
26KB
-
MD5
b72f88b9aaa93f1e77e96bf326b87290
-
SHA1
53283a355b8106e8ca6c372168a604260d7815b2
-
SHA256
f334c443791705443c9ab486d012b136b987caaa51d1bb41a698d8ec3c60ca04
-
SHA512
922843767785b7c13d373ae5a06a91b458659f1c25986490c16074dcc5b93b5c981ad1f41f8bcddc9227ff504645b4907f03eadf4437032dfb5942b32b8146cc
-
SSDEEP
768:tn9opvGMutW+7Qta+dK+5DUod7COE9tzf/6:tngeW+ctaSK+5wtOkb6
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/872-57-0x0000000074F40000-0x0000000074F55000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 108 wrote to memory of 872 108 rundll32.exe 27 PID 108 wrote to memory of 872 108 rundll32.exe 27 PID 108 wrote to memory of 872 108 rundll32.exe 27 PID 108 wrote to memory of 872 108 rundll32.exe 27 PID 108 wrote to memory of 872 108 rundll32.exe 27 PID 108 wrote to memory of 872 108 rundll32.exe 27 PID 108 wrote to memory of 872 108 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f334c443791705443c9ab486d012b136b987caaa51d1bb41a698d8ec3c60ca04.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f334c443791705443c9ab486d012b136b987caaa51d1bb41a698d8ec3c60ca04.dll,#12⤵PID:872
-