Analysis
-
max time kernel
169s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:11
Behavioral task
behavioral1
Sample
a48527e8560587f5231076ae543917285f19adc82e533459e0753d23aff1ba61.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a48527e8560587f5231076ae543917285f19adc82e533459e0753d23aff1ba61.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
a48527e8560587f5231076ae543917285f19adc82e533459e0753d23aff1ba61.dll
-
Size
120KB
-
MD5
09395f797a4532ab99700fe1dc1bb61e
-
SHA1
f4cd5450e513b4fb5214adfe12f7f80b6ec4a572
-
SHA256
a48527e8560587f5231076ae543917285f19adc82e533459e0753d23aff1ba61
-
SHA512
423454a634c0f10543189de72ea7992032c62280241ecb49864955af4a30e16518a9446e1fdf8282d6d30891b04b805e8fa41b74a0beb93f9de14bd85d2d8ab9
-
SSDEEP
3072:z7ekKbqAqkYslueh2XgVOtpewiQqFZVdCe+7JhY/B:3e8kYyRlEew7kZVke+7k
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 2016 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windows.tdl rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2016 1356 rundll32.exe 28 PID 1356 wrote to memory of 2016 1356 rundll32.exe 28 PID 1356 wrote to memory of 2016 1356 rundll32.exe 28 PID 1356 wrote to memory of 2016 1356 rundll32.exe 28 PID 1356 wrote to memory of 2016 1356 rundll32.exe 28 PID 1356 wrote to memory of 2016 1356 rundll32.exe 28 PID 1356 wrote to memory of 2016 1356 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a48527e8560587f5231076ae543917285f19adc82e533459e0753d23aff1ba61.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a48527e8560587f5231076ae543917285f19adc82e533459e0753d23aff1ba61.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
PID:2016
-