Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-01-2023 21:32
Static task
static1
Behavioral task
behavioral1
Sample
163b872bb7209579e9976ecc6d94c9f1d6dc3c5d0d6dd05a983798834b789f96.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
163b872bb7209579e9976ecc6d94c9f1d6dc3c5d0d6dd05a983798834b789f96.dll
Resource
win10v2004-20220812-en
General
-
Target
163b872bb7209579e9976ecc6d94c9f1d6dc3c5d0d6dd05a983798834b789f96.dll
-
Size
1.2MB
-
MD5
bcb4e6cff4cb415947a284dea7fb87bd
-
SHA1
071634c06533cfac2acca121675f9a0bee2efb5d
-
SHA256
163b872bb7209579e9976ecc6d94c9f1d6dc3c5d0d6dd05a983798834b789f96
-
SHA512
a1a5e4c436f9d01cd6916e271bf00fd6bd3caef9126eb20240b49d145472b2a776e090cab729c7932408a56991e3c0a201c5d629e3de1d92911fb8ef2ffb74a4
-
SSDEEP
24576:aV0RgVopY+TpadKoS27f5ZUUFRJnA3ff7+PW0h0+TRXYYETH:pRgVSNYpBH6vfqO0uKZYYETH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1720 1096 rundll32.exe 28 PID 1096 wrote to memory of 1720 1096 rundll32.exe 28 PID 1096 wrote to memory of 1720 1096 rundll32.exe 28 PID 1096 wrote to memory of 1720 1096 rundll32.exe 28 PID 1096 wrote to memory of 1720 1096 rundll32.exe 28 PID 1096 wrote to memory of 1720 1096 rundll32.exe 28 PID 1096 wrote to memory of 1720 1096 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\163b872bb7209579e9976ecc6d94c9f1d6dc3c5d0d6dd05a983798834b789f96.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\163b872bb7209579e9976ecc6d94c9f1d6dc3c5d0d6dd05a983798834b789f96.dll,#12⤵PID:1720
-