Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
31-01-2023 18:51
Behavioral task
behavioral1
Sample
07405c07171566a3bf7c355afaf0c75d41860ac5af98f25ed23108e275759348.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
07405c07171566a3bf7c355afaf0c75d41860ac5af98f25ed23108e275759348.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
07405c07171566a3bf7c355afaf0c75d41860ac5af98f25ed23108e275759348.dll
-
Size
3.2MB
-
MD5
ffdb6ef8ca8ca0e6d3b834efa63ced04
-
SHA1
f4c22233d82dade1b8058bc84b8e9f1f13b90259
-
SHA256
07405c07171566a3bf7c355afaf0c75d41860ac5af98f25ed23108e275759348
-
SHA512
0ed63de437cdb8e59836d4564bcdde1806b317a09a1299c642a0f242d1f4f9497b3b0a3e9acd78c5af54f208e5105e87ef71afa32681e3809c7a494f800ca9ef
-
SSDEEP
98304:RwBLMhqOYbTxk0+GJakKJSu3MoGSU+SCyiBk:RezOYbTiGJafJzXGS3B
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1332 1720 rundll32.exe 28 PID 1720 wrote to memory of 1332 1720 rundll32.exe 28 PID 1720 wrote to memory of 1332 1720 rundll32.exe 28 PID 1720 wrote to memory of 1332 1720 rundll32.exe 28 PID 1720 wrote to memory of 1332 1720 rundll32.exe 28 PID 1720 wrote to memory of 1332 1720 rundll32.exe 28 PID 1720 wrote to memory of 1332 1720 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07405c07171566a3bf7c355afaf0c75d41860ac5af98f25ed23108e275759348.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07405c07171566a3bf7c355afaf0c75d41860ac5af98f25ed23108e275759348.dll,#12⤵PID:1332
-