Overview
overview
3Static
static
3Activacion...er.rar
windows7-x64
3Activacion...er.rar
windows10-2004-x64
3Activacion...ro.cmd
windows7-x64
1Activacion...ro.cmd
windows10-2004-x64
1Activacion...te.exe
windows7-x64
3Activacion...te.exe
windows10-2004-x64
1Activacion...lc.dll
windows7-x64
1Activacion...lc.dll
windows10-2004-x64
1Activacion...Me.txt
windows7-x64
1Activacion...Me.txt
windows10-2004-x64
1Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
Activacion Windows 10 por greyslayer.rar
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Activacion Windows 10 por greyslayer.rar
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Activacion Windows 10 pro - gameandapp/Activacion Windows 10 pro.cmd
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
Activacion Windows 10 pro - gameandapp/Activacion Windows 10 pro.cmd
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Activacion Windows 10 pro - gameandapp/BIN/gatherosstate.exe
Resource
win7-20230705-en
Behavioral task
behavioral6
Sample
Activacion Windows 10 pro - gameandapp/BIN/gatherosstate.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Activacion Windows 10 pro - gameandapp/BIN/slc.dll
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
Activacion Windows 10 pro - gameandapp/BIN/slc.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Activacion Windows 10 pro - gameandapp/ReadMe.txt
Resource
win7-20230705-en
Behavioral task
behavioral10
Sample
Activacion Windows 10 pro - gameandapp/ReadMe.txt
Resource
win10v2004-20230703-en
General
-
Target
Activacion Windows 10 pro - gameandapp/BIN/slc.dll
-
Size
6KB
-
MD5
e2840606372ab67b7107ce757d506c28
-
SHA1
87c1c645eba6d6a2aa695d4fd2ece5fc5e5568ef
-
SHA256
37e20a504ade965184d92ed5ca415cde899090a6a20ea3abf8c85ff9648b66f4
-
SHA512
cf7914a6a8c6d878caeb7f726f86fbdc77d2ea246d9ea600d82a0c66e4154ee0acdbd3ff5949523b35642735d741fde39d177e5d4aff83ea4475ef84e0188ab6
-
SSDEEP
96:B42g18NxaCRTqVSv6SqjNK03LhxMX7Z1NXSEsAYEiXR2PQ9zy:SQRTYSv6bzxMX7Z1NXSEsSlPky
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2120 2272 rundll32.exe 28 PID 2272 wrote to memory of 2120 2272 rundll32.exe 28 PID 2272 wrote to memory of 2120 2272 rundll32.exe 28 PID 2272 wrote to memory of 2120 2272 rundll32.exe 28 PID 2272 wrote to memory of 2120 2272 rundll32.exe 28 PID 2272 wrote to memory of 2120 2272 rundll32.exe 28 PID 2272 wrote to memory of 2120 2272 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Activacion Windows 10 pro - gameandapp\BIN\slc.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Activacion Windows 10 pro - gameandapp\BIN\slc.dll",#12⤵PID:2120
-