Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 04:53
Static task
static1
Behavioral task
behavioral1
Sample
81a703454941768116c6c634ed4c364c3c2d5599275cd650d83c2c904daae0e2.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
81a703454941768116c6c634ed4c364c3c2d5599275cd650d83c2c904daae0e2.dll
Resource
win10v2004-20230703-en
General
-
Target
81a703454941768116c6c634ed4c364c3c2d5599275cd650d83c2c904daae0e2.dll
-
Size
325KB
-
MD5
7eebeeed26bef9d8abf1010a292274df
-
SHA1
cd7c3aa9390394989e3b06baf2e704a92ccd2dac
-
SHA256
81a703454941768116c6c634ed4c364c3c2d5599275cd650d83c2c904daae0e2
-
SHA512
ea836eda32f8eae09545a31b334a94a5094ed221044e36ff31403009e3cb0e9f4131915604c884224f363f4742e9e4946b4caf2762a597fc70a1a2e7953f35d0
-
SSDEEP
3072:yeFnIHeYiyIjU1Gr4M4j5/DzKcDWdU0dyXQUaWERJsRDLwaoI7wI4:yIoOyuU0GS/YXZkORDLwaoI7wI4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2232 2220 rundll32.exe 28 PID 2220 wrote to memory of 2232 2220 rundll32.exe 28 PID 2220 wrote to memory of 2232 2220 rundll32.exe 28 PID 2220 wrote to memory of 2232 2220 rundll32.exe 28 PID 2220 wrote to memory of 2232 2220 rundll32.exe 28 PID 2220 wrote to memory of 2232 2220 rundll32.exe 28 PID 2220 wrote to memory of 2232 2220 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81a703454941768116c6c634ed4c364c3c2d5599275cd650d83c2c904daae0e2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81a703454941768116c6c634ed4c364c3c2d5599275cd650d83c2c904daae0e2.dll,#12⤵PID:2232
-