Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 00:53
Behavioral task
behavioral1
Sample
2532-610-0x0000000003180000-0x00000000032B1000-memory.dll
Resource
win7-20230831-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2532-610-0x0000000003180000-0x00000000032B1000-memory.dll
Resource
win10v2004-20230915-en
0 signatures
150 seconds
General
-
Target
2532-610-0x0000000003180000-0x00000000032B1000-memory.dll
-
Size
1.2MB
-
MD5
23cf17bcb5ae46569014314c3bb960f2
-
SHA1
d9e4e339b00f1b187bccd6ab9a6046c25e9872a6
-
SHA256
17c88d2fe78bdac87bf06c213a2e594324e634107edc63654cbb76669fcf53e3
-
SHA512
f0feb20fa7149544530e5ab9d9f5b3f8824728f4328594a085130e2481494e7e69fdd14511760ef9d1bc15f71b7e2df6b0d3b0674e99968a93d6dd78c422677e
-
SSDEEP
24576:3C7CI9TZDEWk1wCy0zaG9cQAX1ftxmbfYQJZKiTW:7I99DEWVtQAXZmn0Q
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3036 2112 rundll32.exe 28 PID 2112 wrote to memory of 3036 2112 rundll32.exe 28 PID 2112 wrote to memory of 3036 2112 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2532-610-0x0000000003180000-0x00000000032B1000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2112 -s 562⤵PID:3036
-