Analysis
-
max time kernel
1s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 00:37
Static task
static1
Behavioral task
behavioral1
Sample
87bade54c8d61968c237457e21715dfbf4a5047e4d9816b4b23cf16428c8fc0c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87bade54c8d61968c237457e21715dfbf4a5047e4d9816b4b23cf16428c8fc0c.dll
Resource
win10v2004-20221111-en
General
-
Target
87bade54c8d61968c237457e21715dfbf4a5047e4d9816b4b23cf16428c8fc0c.dll
-
Size
8KB
-
MD5
dc97873f0a44b3d25f76610f1a0ce010
-
SHA1
799da84561542bbdf3e939d44c9a1dcbb4d501fc
-
SHA256
87bade54c8d61968c237457e21715dfbf4a5047e4d9816b4b23cf16428c8fc0c
-
SHA512
875d5979aef71ade63bdfc4a02b375182365380525dd36fa0efcb4f9e5cb1c5b1a4995953b4b3abff620e0b2f2b1ecbce195d29b1f0c3d10f9af4baac2e8baf7
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7YXSj/cut:nGTWJGp0UZUd6378snt7fc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1364 1156 rundll32.exe 28 PID 1156 wrote to memory of 1364 1156 rundll32.exe 28 PID 1156 wrote to memory of 1364 1156 rundll32.exe 28 PID 1156 wrote to memory of 1364 1156 rundll32.exe 28 PID 1156 wrote to memory of 1364 1156 rundll32.exe 28 PID 1156 wrote to memory of 1364 1156 rundll32.exe 28 PID 1156 wrote to memory of 1364 1156 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87bade54c8d61968c237457e21715dfbf4a5047e4d9816b4b23cf16428c8fc0c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87bade54c8d61968c237457e21715dfbf4a5047e4d9816b4b23cf16428c8fc0c.dll,#12⤵PID:1364
-