Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01-08-2023 09:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
90bd4ec1a80efa1a137df134325947a6b2102381e9b0cd5b3b4c289789463228.dll
Resource
win7-20230712-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
90bd4ec1a80efa1a137df134325947a6b2102381e9b0cd5b3b4c289789463228.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
90bd4ec1a80efa1a137df134325947a6b2102381e9b0cd5b3b4c289789463228.dll
-
Size
1.9MB
-
MD5
0ce8958c7b1481dd4563a4fcae744d09
-
SHA1
5b37c49e803414b9c44974b548a1451cb5cd689a
-
SHA256
90bd4ec1a80efa1a137df134325947a6b2102381e9b0cd5b3b4c289789463228
-
SHA512
ab74932c8ac63d0c86d0a4f391a99338464b4ec12520de7eb7474b7d8b7aed8a7b54dcefeafa014443f2c29108d9fc1ab73b2f78a1127f66055c50a25042d300
-
SSDEEP
49152:/eo8Gli4dZNSqh7mdsI3ozug+ZDPuX7T:/eClirqasI3o0DP
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1640 2180 rundll32.exe 28 PID 2180 wrote to memory of 1640 2180 rundll32.exe 28 PID 2180 wrote to memory of 1640 2180 rundll32.exe 28 PID 2180 wrote to memory of 1640 2180 rundll32.exe 28 PID 2180 wrote to memory of 1640 2180 rundll32.exe 28 PID 2180 wrote to memory of 1640 2180 rundll32.exe 28 PID 2180 wrote to memory of 1640 2180 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90bd4ec1a80efa1a137df134325947a6b2102381e9b0cd5b3b4c289789463228.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90bd4ec1a80efa1a137df134325947a6b2102381e9b0cd5b3b4c289789463228.dll,#12⤵PID:1640
-