Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
e807ad58870e58f455e02370aee519774225faa304822a743e0f74f59060b089.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e807ad58870e58f455e02370aee519774225faa304822a743e0f74f59060b089.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e807ad58870e58f455e02370aee519774225faa304822a743e0f74f59060b089.dll
-
Size
62KB
-
MD5
37559a4fcfe58d63d0fca3922ab879e2
-
SHA1
db91274464cbe968c5fcd222cda90caf41c66509
-
SHA256
e807ad58870e58f455e02370aee519774225faa304822a743e0f74f59060b089
-
SHA512
a8c11a37f6cf1bfd0166f7619c365131c28e12a08a80678e9eeb6a064bad3ae5505cf0909e2d429d7845424378d79cb198b12dea502f2de6f4c1a86933bb32d7
-
SSDEEP
1536:ltKXMx/YikoLhRCLj3NrFHWIbTttGfDKy:3hYibGXdrgkT7GfDK
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2036-59-0x00000000001B0000-0x00000000001BD000-memory.dmp upx behavioral1/memory/2036-60-0x00000000001B0000-0x00000000001BD000-memory.dmp upx behavioral1/memory/2036-56-0x00000000001B0000-0x00000000001BD000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2036 1900 rundll32.exe 27 PID 1900 wrote to memory of 2036 1900 rundll32.exe 27 PID 1900 wrote to memory of 2036 1900 rundll32.exe 27 PID 1900 wrote to memory of 2036 1900 rundll32.exe 27 PID 1900 wrote to memory of 2036 1900 rundll32.exe 27 PID 1900 wrote to memory of 2036 1900 rundll32.exe 27 PID 1900 wrote to memory of 2036 1900 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e807ad58870e58f455e02370aee519774225faa304822a743e0f74f59060b089.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e807ad58870e58f455e02370aee519774225faa304822a743e0f74f59060b089.dll,#12⤵PID:2036
-