Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15/02/2023, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
5ae0921ac4b13494019bc91e4d4a8f70fb82bc4ab316ba739411f24b0bfcce7a.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ae0921ac4b13494019bc91e4d4a8f70fb82bc4ab316ba739411f24b0bfcce7a.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
5ae0921ac4b13494019bc91e4d4a8f70fb82bc4ab316ba739411f24b0bfcce7a.dll
-
Size
308KB
-
MD5
a8342ab09310873723e4ec78709ebeb5
-
SHA1
593e8e2a4bbe078ef64651597c7dfc69c6a5ab7a
-
SHA256
5ae0921ac4b13494019bc91e4d4a8f70fb82bc4ab316ba739411f24b0bfcce7a
-
SHA512
aa0a5c02b470f8ad4e609bcd73411ce2bdf18c61490f0bb0e85c4ff1aea61e65ebca6d0c04af62aa27ab9cf147066af37d2977cbcb0896dc4cb7eca261e12a2f
-
SSDEEP
6144:q3dH/4b6jWUudbnK8SO6383oVJVwQnr/A4:KI2TwoHk4
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1652 wrote to memory of 604 1652 rundll32.exe 28 PID 1652 wrote to memory of 604 1652 rundll32.exe 28 PID 1652 wrote to memory of 604 1652 rundll32.exe 28 PID 1652 wrote to memory of 604 1652 rundll32.exe 28 PID 1652 wrote to memory of 604 1652 rundll32.exe 28 PID 1652 wrote to memory of 604 1652 rundll32.exe 28 PID 1652 wrote to memory of 604 1652 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ae0921ac4b13494019bc91e4d4a8f70fb82bc4ab316ba739411f24b0bfcce7a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ae0921ac4b13494019bc91e4d4a8f70fb82bc4ab316ba739411f24b0bfcce7a.dll,#12⤵PID:604
-