Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 00:31
Behavioral task
behavioral1
Sample
4756-399-0x0000000002AA0000-0x0000000002BD1000-memory.dll
Resource
win7-20230831-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4756-399-0x0000000002AA0000-0x0000000002BD1000-memory.dll
Resource
win10v2004-20230915-en
0 signatures
150 seconds
General
-
Target
4756-399-0x0000000002AA0000-0x0000000002BD1000-memory.dll
-
Size
1.2MB
-
MD5
e894b119aad943bdf0ce5e5b8c9cd73a
-
SHA1
6b4ea141ea25dc0bc4a9a1748a976922558399f9
-
SHA256
0a487978ddbed0db7c7e293ea2936b97a2fcb331863b71c60de9cec76598b2c1
-
SHA512
891994288963964c503716e84b01382ee01f9afac10c5890ec92201dea8d50e145b2bd25c37e620d70dfccb18e217eccb3c936e59d7af48df1cae8f5cef43f2d
-
SSDEEP
24576:3C7CI9TZDEWk1wCy0zaG9cQAY1ftxmbfYQJZK2+0:7I99DEWVtQAYZmn0Z
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2140 1044 rundll32.exe 28 PID 1044 wrote to memory of 2140 1044 rundll32.exe 28 PID 1044 wrote to memory of 2140 1044 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4756-399-0x0000000002AA0000-0x0000000002BD1000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1044 -s 562⤵PID:2140
-