Analysis
-
max time kernel
2s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 06:07
Static task
static1
Behavioral task
behavioral1
Sample
c860cd97a8312eadc9a3f2d9b63e5e8f2b06fa1c87063823eb18e883298828c5.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c860cd97a8312eadc9a3f2d9b63e5e8f2b06fa1c87063823eb18e883298828c5.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c860cd97a8312eadc9a3f2d9b63e5e8f2b06fa1c87063823eb18e883298828c5.dll
-
Size
163KB
-
MD5
f9b53f0209ea15c878e8dbee37a2a289
-
SHA1
387f94ca6e9574508db9145c6ba436b318f6fd87
-
SHA256
c860cd97a8312eadc9a3f2d9b63e5e8f2b06fa1c87063823eb18e883298828c5
-
SHA512
3810cf373a1c0522a3a52dd851f027c1db0288ff5efbb4a1702b8f4301523e92615f902c66f87887c31c8cf11fd972b7559a86533b5eb6be12ea1c31467b6cb5
-
SSDEEP
3072:MHVEk9YaXoLoZL1Zl4+OElbPdp/QSVH1Y6:M1jWaXo8YdExXVH15
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2036 1748 rundll32.exe 28 PID 1748 wrote to memory of 2036 1748 rundll32.exe 28 PID 1748 wrote to memory of 2036 1748 rundll32.exe 28 PID 1748 wrote to memory of 2036 1748 rundll32.exe 28 PID 1748 wrote to memory of 2036 1748 rundll32.exe 28 PID 1748 wrote to memory of 2036 1748 rundll32.exe 28 PID 1748 wrote to memory of 2036 1748 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c860cd97a8312eadc9a3f2d9b63e5e8f2b06fa1c87063823eb18e883298828c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c860cd97a8312eadc9a3f2d9b63e5e8f2b06fa1c87063823eb18e883298828c5.dll,#12⤵PID:2036
-