Analysis
-
max time kernel
19s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
2cbc032b8a68d1aec8e5d84d5ea6a8e0d18f58d083487e84412bb4171cbfe7c8.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cbc032b8a68d1aec8e5d84d5ea6a8e0d18f58d083487e84412bb4171cbfe7c8.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
2cbc032b8a68d1aec8e5d84d5ea6a8e0d18f58d083487e84412bb4171cbfe7c8.dll
-
Size
151KB
-
MD5
52e966d4099c49283723200f33f56080
-
SHA1
c6515e2fa9db6920492a88dd746299c1c42fd6d9
-
SHA256
2cbc032b8a68d1aec8e5d84d5ea6a8e0d18f58d083487e84412bb4171cbfe7c8
-
SHA512
30b30083a2c07614347fd68fdb6da96901dc8b1ac4453150009d82a56cfe70646aedcb027574841d0f51249c9337a6c847f711f74243d0f46bd7e35af67d6c53
-
SSDEEP
3072:7BvbVhqMtE+xTkekDf8YGO5wEJMdAeDSP49R+6:75+GEv50dJ3E6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2044 2040 rundll32.exe 28 PID 2040 wrote to memory of 2044 2040 rundll32.exe 28 PID 2040 wrote to memory of 2044 2040 rundll32.exe 28 PID 2040 wrote to memory of 2044 2040 rundll32.exe 28 PID 2040 wrote to memory of 2044 2040 rundll32.exe 28 PID 2040 wrote to memory of 2044 2040 rundll32.exe 28 PID 2040 wrote to memory of 2044 2040 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbc032b8a68d1aec8e5d84d5ea6a8e0d18f58d083487e84412bb4171cbfe7c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbc032b8a68d1aec8e5d84d5ea6a8e0d18f58d083487e84412bb4171cbfe7c8.dll,#12⤵PID:2044
-