Analysis
-
max time kernel
27s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 21:57
Static task
static1
Behavioral task
behavioral1
Sample
97a9aac567d7e35c1829b0289adaa694a77c679de43d8bff296ac9f6b76732b4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97a9aac567d7e35c1829b0289adaa694a77c679de43d8bff296ac9f6b76732b4.dll
Resource
win10v2004-20220812-en
General
-
Target
97a9aac567d7e35c1829b0289adaa694a77c679de43d8bff296ac9f6b76732b4.dll
-
Size
32KB
-
MD5
9a8724eece32050379f340c1faa74016
-
SHA1
2afaadf703dadfefaa1a1e097f551cc23e9d8849
-
SHA256
97a9aac567d7e35c1829b0289adaa694a77c679de43d8bff296ac9f6b76732b4
-
SHA512
9476d499ed4d7ade9a86ae1a879da2b89c687260f6a49f7c5def06d840f23651b0efe5406432045dac659bd7f62271229028e059f38da2ef90110f2fab5967d7
-
SSDEEP
384:/UIsK3EA9NMG5YBPUi9MY9zoDpb77+/VZSXGQG9aFJFrWCRIFs1p:/sKUTeos4MY9zqb7QZkGZ96BTRIO1p
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27 PID 1620 wrote to memory of 1732 1620 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97a9aac567d7e35c1829b0289adaa694a77c679de43d8bff296ac9f6b76732b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97a9aac567d7e35c1829b0289adaa694a77c679de43d8bff296ac9f6b76732b4.dll,#12⤵PID:1732
-