Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
02-07-2023 17:09
Static task
static1
Behavioral task
behavioral1
Sample
Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll
Resource
win10v2004-20230621-en
General
-
Target
Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll
-
Size
4KB
-
MD5
e2f86a5108d82182213299ba3f5965bb
-
SHA1
67ea91ca639efc1748c79cfbaec8500724bbd203
-
SHA256
9767d97779ae43bad6c313025b087fd8f23b1b8a40b91ff0acd1d9c2019ce579
-
SHA512
2f57220475286fee2f51a7ded27f3ed9ad7dcd473dde37bf387289897328883867a1355b71cbeba98767c636205bd1ff7705e9ca5a8014c54112978737caf561
-
SSDEEP
48:vpgLClZ7snpfV1cLfvf/EtWPblbjOsV2OLuZKQi3uYmRhHSQ:BVJQt1cbvfJpvV2wuZdi3uVRhHSQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1684 1412 rundll32.exe 28 PID 1412 wrote to memory of 1684 1412 rundll32.exe 28 PID 1412 wrote to memory of 1684 1412 rundll32.exe 28 PID 1412 wrote to memory of 1684 1412 rundll32.exe 28 PID 1412 wrote to memory of 1684 1412 rundll32.exe 28 PID 1412 wrote to memory of 1684 1412 rundll32.exe 28 PID 1412 wrote to memory of 1684 1412 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll,#12⤵PID:1684
-