Analysis
-
max time kernel
31s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 01:13
Behavioral task
behavioral1
Sample
ef163ea859189630a696c9abe574cd5317c818caa4b8314aa7950e1f48b9d490.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ef163ea859189630a696c9abe574cd5317c818caa4b8314aa7950e1f48b9d490.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
ef163ea859189630a696c9abe574cd5317c818caa4b8314aa7950e1f48b9d490.dll
-
Size
68KB
-
MD5
213f8fe2e7c25534ac9894cfa42277f2
-
SHA1
4de8367b9306ba2c44ef9f13aa636deefc90986b
-
SHA256
ef163ea859189630a696c9abe574cd5317c818caa4b8314aa7950e1f48b9d490
-
SHA512
d685604cc0ea8920ff1097bf45379fafd7fd8d1527f1e27fbaa4275412ce5b997d526dfd635b9038f0d17046179d267545ec3731b642265b2ef5df1bf764f447
-
SSDEEP
1536:n7ZLNPp9pZBMrq91bz6WM6dshWwj4671q6GySyuKCXpA5:7Zpp9YWM6Wzj464ySy0X8
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1716 1224 rundll32.exe 28 PID 1224 wrote to memory of 1716 1224 rundll32.exe 28 PID 1224 wrote to memory of 1716 1224 rundll32.exe 28 PID 1224 wrote to memory of 1716 1224 rundll32.exe 28 PID 1224 wrote to memory of 1716 1224 rundll32.exe 28 PID 1224 wrote to memory of 1716 1224 rundll32.exe 28 PID 1224 wrote to memory of 1716 1224 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef163ea859189630a696c9abe574cd5317c818caa4b8314aa7950e1f48b9d490.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef163ea859189630a696c9abe574cd5317c818caa4b8314aa7950e1f48b9d490.dll,#12⤵PID:1716
-