Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 20:08
Behavioral task
behavioral1
Sample
e9c331e5e9541c9aaab843e7227f2fee1778840e416c585ec4184cb29cd64264.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e9c331e5e9541c9aaab843e7227f2fee1778840e416c585ec4184cb29cd64264.dll
Resource
win10v2004-20230220-en
General
-
Target
e9c331e5e9541c9aaab843e7227f2fee1778840e416c585ec4184cb29cd64264.dll
-
Size
288KB
-
MD5
54f3ce95eb56b1f4861041ca4b2173fb
-
SHA1
797605d59553d5426fbca42f37b282cc03b0e3f3
-
SHA256
e9c331e5e9541c9aaab843e7227f2fee1778840e416c585ec4184cb29cd64264
-
SHA512
20baa461b47185b71caf41c74af3e4f3285e3af33f39d60c3823ba3e63ccbb77b4c064552b932f155561029d035f98465b866a81bf005f9c965ed062e172f26b
-
SSDEEP
3072:cBiYmO/Kvrg9fAINn3BURX2cNQoPqRDCnopdVJJTffVpzhUDJ351OfctB2UXeI:cBiYmO/Kvrg9fPxUwXmqRUopdv0qsxd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1224 1764 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9c331e5e9541c9aaab843e7227f2fee1778840e416c585ec4184cb29cd64264.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9c331e5e9541c9aaab843e7227f2fee1778840e416c585ec4184cb29cd64264.dll,#12⤵PID:1224