Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-08-2023 15:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
81c607849522ad97495557efaf23540f1f3ca2ab1ae9d1f8424f6fc82569c6fe.dll
Resource
win7-20230712-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
81c607849522ad97495557efaf23540f1f3ca2ab1ae9d1f8424f6fc82569c6fe.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
81c607849522ad97495557efaf23540f1f3ca2ab1ae9d1f8424f6fc82569c6fe.dll
-
Size
335KB
-
MD5
7e23a6e2e6a9cd8c7b16135bdf1dc9f9
-
SHA1
93792bb1e8284f5edaa94eb6dfae770cd7d807b2
-
SHA256
81c607849522ad97495557efaf23540f1f3ca2ab1ae9d1f8424f6fc82569c6fe
-
SHA512
2e7f21f658f3c5ad94fc30b5d64a63839ae7979ad79cf43a8188f85c659dadd761f2daa43ddcf90df10540a619a8481b62047d4af00413cffd2b539a9b113235
-
SSDEEP
6144:U9ZxgS8p4J093jAxEWv1gmpMKG1R9MVR:U9Zt8p4DgmE1RWVR
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1452 1540 rundll32.exe 30 PID 1540 wrote to memory of 1452 1540 rundll32.exe 30 PID 1540 wrote to memory of 1452 1540 rundll32.exe 30 PID 1540 wrote to memory of 1452 1540 rundll32.exe 30 PID 1540 wrote to memory of 1452 1540 rundll32.exe 30 PID 1540 wrote to memory of 1452 1540 rundll32.exe 30 PID 1540 wrote to memory of 1452 1540 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c607849522ad97495557efaf23540f1f3ca2ab1ae9d1f8424f6fc82569c6fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c607849522ad97495557efaf23540f1f3ca2ab1ae9d1f8424f6fc82569c6fe.dll,#12⤵PID:1452
-