Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 20:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ed52a1d09c7cdb20c4762c67522ed4497cc7c6f60ce6f333fea55b2c4cdf8f3a.dll
Resource
win7-20230220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ed52a1d09c7cdb20c4762c67522ed4497cc7c6f60ce6f333fea55b2c4cdf8f3a.dll
Resource
win10v2004-20230220-en
1 signatures
150 seconds
General
-
Target
ed52a1d09c7cdb20c4762c67522ed4497cc7c6f60ce6f333fea55b2c4cdf8f3a.dll
-
Size
60KB
-
MD5
4dbf27d394fadad481f89ca78ecb359b
-
SHA1
6c1c7cc53b756fca18997167c18c64578ece963a
-
SHA256
ed52a1d09c7cdb20c4762c67522ed4497cc7c6f60ce6f333fea55b2c4cdf8f3a
-
SHA512
6a6bc533825984b3b50e92efed12ea5ac01ba1dfd6cf2f14cf3cefe583d5f7dbb6b149d733b4c35cf01b29f14f9617f8830942affb862f86695bba6b6fcb95c6
-
SSDEEP
768:Xw20o2KIDQw8okUvPJqLu3Fl/J6Fq4oZM:12xvELu38boZM
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1240 wrote to memory of 832 1240 rundll32.exe 27 PID 1240 wrote to memory of 832 1240 rundll32.exe 27 PID 1240 wrote to memory of 832 1240 rundll32.exe 27 PID 1240 wrote to memory of 832 1240 rundll32.exe 27 PID 1240 wrote to memory of 832 1240 rundll32.exe 27 PID 1240 wrote to memory of 832 1240 rundll32.exe 27 PID 1240 wrote to memory of 832 1240 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed52a1d09c7cdb20c4762c67522ed4497cc7c6f60ce6f333fea55b2c4cdf8f3a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed52a1d09c7cdb20c4762c67522ed4497cc7c6f60ce6f333fea55b2c4cdf8f3a.dll,#12⤵PID:832
-