Analysis
-
max time kernel
39s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
4aa376313c29f6d3766d64323c492cc015e53f398d4bc3d1227251f9247ed7c4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4aa376313c29f6d3766d64323c492cc015e53f398d4bc3d1227251f9247ed7c4.dll
Resource
win10v2004-20221111-en
General
-
Target
4aa376313c29f6d3766d64323c492cc015e53f398d4bc3d1227251f9247ed7c4.dll
-
Size
6KB
-
MD5
398ccbd44c26ccd723b5a5c2f8b39b80
-
SHA1
efa7b35878a5e6bc0f9ca85f8cd989986c5d7d53
-
SHA256
4aa376313c29f6d3766d64323c492cc015e53f398d4bc3d1227251f9247ed7c4
-
SHA512
472ba3d39a33dcb4820884a0f931b0298775b23856321f25632a8e51642969fe14b2b0698a16e82d2e5ef573cb9ddde67f2d7ec667e335be42e19cbc218ab1f3
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7oDPhYua:nGTWJGp0UZUd6378snt76JI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1852 1424 rundll32.exe 26 PID 1424 wrote to memory of 1852 1424 rundll32.exe 26 PID 1424 wrote to memory of 1852 1424 rundll32.exe 26 PID 1424 wrote to memory of 1852 1424 rundll32.exe 26 PID 1424 wrote to memory of 1852 1424 rundll32.exe 26 PID 1424 wrote to memory of 1852 1424 rundll32.exe 26 PID 1424 wrote to memory of 1852 1424 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aa376313c29f6d3766d64323c492cc015e53f398d4bc3d1227251f9247ed7c4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aa376313c29f6d3766d64323c492cc015e53f398d4bc3d1227251f9247ed7c4.dll,#12⤵PID:1852
-