Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
26-06-2023 03:16
Static task
static1
Behavioral task
behavioral1
Sample
6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll
Resource
win10v2004-20230621-en
General
-
Target
6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll
-
Size
235KB
-
MD5
8e37795097400f6a609525749d154cd0
-
SHA1
8e1502c2aa56e6a8c7c1d2c75f3946332a5bb8c0
-
SHA256
6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b
-
SHA512
c7453b8f50e557a5990ac3708931845eeb6dc2992cd907d5534733524f523226d8d013be6e09bb2b5210f6f5ad2303625f8998a5111d3b0925bb4228b6c9152a
-
SSDEEP
3072:CmmeuJ6jkhHVFpvq69D6UkqGFpMdsiOXdaygQ6YToG+rt:BmRJAkbFJqVvBpMZOcQ3Gt
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2044 2032 rundll32.exe 28 PID 2032 wrote to memory of 2044 2032 rundll32.exe 28 PID 2032 wrote to memory of 2044 2032 rundll32.exe 28 PID 2032 wrote to memory of 2044 2032 rundll32.exe 28 PID 2032 wrote to memory of 2044 2032 rundll32.exe 28 PID 2032 wrote to memory of 2044 2032 rundll32.exe 28 PID 2032 wrote to memory of 2044 2032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll,#12⤵PID:2044
-