Analysis
-
max time kernel
40s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
88f15ab6a3c6000f2de6ce4052abbc6135cb1789f9d4fed7c0d7312bba6e5261.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
88f15ab6a3c6000f2de6ce4052abbc6135cb1789f9d4fed7c0d7312bba6e5261.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
88f15ab6a3c6000f2de6ce4052abbc6135cb1789f9d4fed7c0d7312bba6e5261.dll
-
Size
5KB
-
MD5
7bbf5c0c3f8915095b22de3e26b43700
-
SHA1
6c226983148430ec0615b15a4e661187d7cf49c6
-
SHA256
88f15ab6a3c6000f2de6ce4052abbc6135cb1789f9d4fed7c0d7312bba6e5261
-
SHA512
40f67d594b300b2f35be7bb6a1f55b205104a70b6e65a258cac1938d379d897c4e7a173f985b81e4507884f27039848ce4e750c9db7a627aea7bca61624e0be8
-
SSDEEP
96:XprYDpKnI6wJ+Ls7guyHejyn/I9l0iai/l9m+:XUcA+ggd+W/If0i9l4+
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1292 2028 rundll32.exe 28 PID 2028 wrote to memory of 1292 2028 rundll32.exe 28 PID 2028 wrote to memory of 1292 2028 rundll32.exe 28 PID 2028 wrote to memory of 1292 2028 rundll32.exe 28 PID 2028 wrote to memory of 1292 2028 rundll32.exe 28 PID 2028 wrote to memory of 1292 2028 rundll32.exe 28 PID 2028 wrote to memory of 1292 2028 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88f15ab6a3c6000f2de6ce4052abbc6135cb1789f9d4fed7c0d7312bba6e5261.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88f15ab6a3c6000f2de6ce4052abbc6135cb1789f9d4fed7c0d7312bba6e5261.dll,#12⤵PID:1292
-