Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:04 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll
Resource
win10v2004-20220901-en
General
-
Target
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll
-
Size
103KB
-
MD5
3246ac50a414808ead31738c7351e3b1
-
SHA1
a6cb3aecce1bd8335937ef08299773535bb5bd2e
-
SHA256
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b
-
SHA512
35d19ecce41c50ae8cde002b43351fde976e1ea99288483c01993efe91810fe4596a8f2a0260f6d38d302314f6afd2a8c47437ad6a69ea55b6bc93e47c234fb2
-
SSDEEP
1536:m3Tp2Pw5jF2GjG/t9fL1r77opkt2AuTbe7dLa6qGDJ9UyV7rXSBk:o0Pw5YGjG19fp7Rt2x/ONqGDXUyVPSB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26 PID 2020 wrote to memory of 1472 2020 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll,#12⤵PID:1472
-