Analysis
-
max time kernel
57s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
ecb7972c8f74554a86fb9e702da5759fb24adbf553d31c5a55a4500a4188c7e5.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecb7972c8f74554a86fb9e702da5759fb24adbf553d31c5a55a4500a4188c7e5.dll
Resource
win10v2004-20221111-en
General
-
Target
ecb7972c8f74554a86fb9e702da5759fb24adbf553d31c5a55a4500a4188c7e5.dll
-
Size
6KB
-
MD5
1b8319f159696be38de4f230c78d4810
-
SHA1
a4533cca8c126fee996c3495a7c95ed23f9ed8dd
-
SHA256
ecb7972c8f74554a86fb9e702da5759fb24adbf553d31c5a55a4500a4188c7e5
-
SHA512
f1414915c86ebaefe7a4f89b1d2c99ba32bfb5245b23a1df2926de0ee9b1cb592da7c522b5292cc090a6aa99007c715b7153211a5d79bcdd60138c6fd27d112a
-
SSDEEP
48:C6Vo9HBok7lYa92RranDBetlG9Mgi3bp2pvHKzpTbQVJrpbJGI/zp:nI2RrUeqg3aKxQVJpJGI/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1972 2036 rundll32.exe 28 PID 2036 wrote to memory of 1972 2036 rundll32.exe 28 PID 2036 wrote to memory of 1972 2036 rundll32.exe 28 PID 2036 wrote to memory of 1972 2036 rundll32.exe 28 PID 2036 wrote to memory of 1972 2036 rundll32.exe 28 PID 2036 wrote to memory of 1972 2036 rundll32.exe 28 PID 2036 wrote to memory of 1972 2036 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecb7972c8f74554a86fb9e702da5759fb24adbf553d31c5a55a4500a4188c7e5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecb7972c8f74554a86fb9e702da5759fb24adbf553d31c5a55a4500a4188c7e5.dll,#12⤵PID:1972
-