Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 00:10
Static task
static1
Behavioral task
behavioral1
Sample
5fca965fa565590d2d46b019c0895982afa9dcfff348dcfc4b18183bee11c773.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5fca965fa565590d2d46b019c0895982afa9dcfff348dcfc4b18183bee11c773.dll
Resource
win10v2004-20230220-en
General
-
Target
5fca965fa565590d2d46b019c0895982afa9dcfff348dcfc4b18183bee11c773.dll
-
Size
64KB
-
MD5
72f57815b43dfab45654a1585b6128b7
-
SHA1
4eb1a371fb9dea7bf84ec40b7d7e520aa7744c7d
-
SHA256
5fca965fa565590d2d46b019c0895982afa9dcfff348dcfc4b18183bee11c773
-
SHA512
fdc96aadd00c532831b58243b96e8c7f75d5888c4f8e53110dfbb55c2bad0b36e0d170e0320d95188ea47a40975527c4ec1a91a0c105ee54f20f81a16896e77d
-
SSDEEP
768:oXV8HpyBuhaD3UT9L2kvtNN3BzN2r5HoO9pVgmFj9ohvtCFmaJPJ9drjr:lp+wajcEyt33UVoO9D17oWsaBJ9drjr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1696 2020 rundll32.exe 28 PID 2020 wrote to memory of 1696 2020 rundll32.exe 28 PID 2020 wrote to memory of 1696 2020 rundll32.exe 28 PID 2020 wrote to memory of 1696 2020 rundll32.exe 28 PID 2020 wrote to memory of 1696 2020 rundll32.exe 28 PID 2020 wrote to memory of 1696 2020 rundll32.exe 28 PID 2020 wrote to memory of 1696 2020 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5fca965fa565590d2d46b019c0895982afa9dcfff348dcfc4b18183bee11c773.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5fca965fa565590d2d46b019c0895982afa9dcfff348dcfc4b18183bee11c773.dll,#12⤵PID:1696
-