Analysis
-
max time kernel
39s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 00:36
Static task
static1
Behavioral task
behavioral1
Sample
d17607d0132ee6eee3c4e16ff25ba817d2bd0ed8b0e553ad1527b02f419d21cd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d17607d0132ee6eee3c4e16ff25ba817d2bd0ed8b0e553ad1527b02f419d21cd.dll
Resource
win10v2004-20220901-en
General
-
Target
d17607d0132ee6eee3c4e16ff25ba817d2bd0ed8b0e553ad1527b02f419d21cd.dll
-
Size
6KB
-
MD5
a6e7139c08fa6c26b5a267e32017de10
-
SHA1
88c854c6e4b57f3f777fa0da89819d1b0de7e831
-
SHA256
d17607d0132ee6eee3c4e16ff25ba817d2bd0ed8b0e553ad1527b02f419d21cd
-
SHA512
659afc9f2ee5c3f62961aa6d9a19a060eda995ee05227e57f548a917e364b48f38c52b945bcf808f49897046f798ea0304413601e442f8d3aa1c23ba10c24767
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7QWSA:nGTWJGp0UZUd6378snt7PSA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 604 2044 rundll32.exe 26 PID 2044 wrote to memory of 604 2044 rundll32.exe 26 PID 2044 wrote to memory of 604 2044 rundll32.exe 26 PID 2044 wrote to memory of 604 2044 rundll32.exe 26 PID 2044 wrote to memory of 604 2044 rundll32.exe 26 PID 2044 wrote to memory of 604 2044 rundll32.exe 26 PID 2044 wrote to memory of 604 2044 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d17607d0132ee6eee3c4e16ff25ba817d2bd0ed8b0e553ad1527b02f419d21cd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d17607d0132ee6eee3c4e16ff25ba817d2bd0ed8b0e553ad1527b02f419d21cd.dll,#12⤵PID:604
-