Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 20:21
Behavioral task
behavioral1
Sample
df8e8d2b8c80492da80237195083ad9e7ec344faff980687062fb4d6a17c8188.dll
Resource
win7-20230220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
df8e8d2b8c80492da80237195083ad9e7ec344faff980687062fb4d6a17c8188.dll
Resource
win10v2004-20230220-en
1 signatures
150 seconds
General
-
Target
df8e8d2b8c80492da80237195083ad9e7ec344faff980687062fb4d6a17c8188.dll
-
Size
658KB
-
MD5
1e464ecdeab9dfbf5da81012154d4199
-
SHA1
0c87c08ba7703162d084c7b2dc6eddd1b620dc3c
-
SHA256
df8e8d2b8c80492da80237195083ad9e7ec344faff980687062fb4d6a17c8188
-
SHA512
ee770a2a71656a599747472092bd6836c6029274c66167846d06aacfd0dbc29c668bc4a00bb0b51a66f4ecdddf048445234a4bfea90fe8cfa677fd9013850d38
-
SSDEEP
12288:7Nby5uo6aB59IWvmeP7nrrcYmVrXaVFTNoS8K/5:JXo6aBHLvmAnncYmVrqdoSx5
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1764 1984 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df8e8d2b8c80492da80237195083ad9e7ec344faff980687062fb4d6a17c8188.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df8e8d2b8c80492da80237195083ad9e7ec344faff980687062fb4d6a17c8188.dll,#12⤵