Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 03:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b933a8fe22573a43e67e231b7a65c420c05ddc6935fa143122bcfae1f40f6ed.dll
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b933a8fe22573a43e67e231b7a65c420c05ddc6935fa143122bcfae1f40f6ed.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5b933a8fe22573a43e67e231b7a65c420c05ddc6935fa143122bcfae1f40f6ed.dll
-
Size
218KB
-
MD5
bfa55bd390dc624d272e90676f860bf2
-
SHA1
a06471c4d1a7e16417a8a6b794b6692bdd8b57e8
-
SHA256
5b933a8fe22573a43e67e231b7a65c420c05ddc6935fa143122bcfae1f40f6ed
-
SHA512
80808bca9fd3fe2a448031560a63791727420367601eba44bc748893ac47559c49b97fbb5c1aa64b9849ac48786390b6f6ede06eef8c1ed7083fc2f53dd5885e
-
SSDEEP
6144:XON5HbHJmW9gGfaAO1TBG8xemND2foi73:Xo7PEXTg8xemND6oi73
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1912 1920 rundll32.exe 27 PID 1920 wrote to memory of 1912 1920 rundll32.exe 27 PID 1920 wrote to memory of 1912 1920 rundll32.exe 27 PID 1920 wrote to memory of 1912 1920 rundll32.exe 27 PID 1920 wrote to memory of 1912 1920 rundll32.exe 27 PID 1920 wrote to memory of 1912 1920 rundll32.exe 27 PID 1920 wrote to memory of 1912 1920 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b933a8fe22573a43e67e231b7a65c420c05ddc6935fa143122bcfae1f40f6ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b933a8fe22573a43e67e231b7a65c420c05ddc6935fa143122bcfae1f40f6ed.dll,#12⤵PID:1912
-