Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 01:43
Static task
static1
Behavioral task
behavioral1
Sample
c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll
Resource
win10v2004-20220901-en
General
-
Target
c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll
-
Size
14KB
-
MD5
a2cd5f992f6ea8bd922ba101157cf36b
-
SHA1
6f12e2922dd58ce388feada599d31844a4d1e561
-
SHA256
c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85
-
SHA512
41ada227142af643888c10ec17f3a6907251d4957c63bb2247cb9ae28b8a4164dd0f795bd7148febe7d37de0046f9d2ca2b69f161eceeb4c9a94ff16530e28ae
-
SSDEEP
192:SrGTRW3l0vdV+w/cwA1IZET6mbNKUSNh8MRhHPzR67fIOsyr6MNE2E8lNiWglt:SrUY2vDFUwCIwbWlRJ9GIzynE2hNQlt
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1948 1944 rundll32.exe 27 PID 1944 wrote to memory of 1948 1944 rundll32.exe 27 PID 1944 wrote to memory of 1948 1944 rundll32.exe 27 PID 1944 wrote to memory of 1948 1944 rundll32.exe 27 PID 1944 wrote to memory of 1948 1944 rundll32.exe 27 PID 1944 wrote to memory of 1948 1944 rundll32.exe 27 PID 1944 wrote to memory of 1948 1944 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll,#12⤵PID:1948
-