Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 21:17
Static task
static1
Behavioral task
behavioral1
Sample
7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll
Resource
win10v2004-20230220-en
General
-
Target
7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll
-
Size
308KB
-
MD5
7d65acaeb3f88c463a7e05846e8c5f5c
-
SHA1
25e6593e54a663ee02d7c9af6e97d45f922aa40d
-
SHA256
7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43
-
SHA512
edd7b91a8688ddf2875e223cee4d1454464c9b12a4d524d6f54278f11f2e54cfd50f578ed6ee92d253cce6b57858b5a5b4e1213faa5c6c4f2a0e424b8e58669f
-
SSDEEP
6144:zhIRcUwV+KN9meCAQARgoXnF0u/utFjoqcDSRXVyHDff2bp6+h4OoVicAEqI2W:zyRoN9meCAQARgoX2u/utF8qcD0FGfM/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1172 1108 rundll32.exe 27 PID 1108 wrote to memory of 1172 1108 rundll32.exe 27 PID 1108 wrote to memory of 1172 1108 rundll32.exe 27 PID 1108 wrote to memory of 1172 1108 rundll32.exe 27 PID 1108 wrote to memory of 1172 1108 rundll32.exe 27 PID 1108 wrote to memory of 1172 1108 rundll32.exe 27 PID 1108 wrote to memory of 1172 1108 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll,#12⤵PID:1172
-