Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll
Resource
win10v2004-20230703-en
General
-
Target
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll
-
Size
263KB
-
MD5
81dba9c0e3ccd62cb4eb227a3e2f12b0
-
SHA1
546ec8366f335a62a38c1212c3658a880bc48378
-
SHA256
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd
-
SHA512
77c12b24f4183ffbef2f3096efa6adf7aadf775584a33d90c3edfed1bd572d27149a508ab6f6c4c04434c1c638e895b5c897745d9ec4161c0ed8ed3ab259be47
-
SSDEEP
3072:SuNR0oDe/sy8cN+x/cBW2j+avTpFsNWTylkWaSbi2196Y/mEYZJC5ZlX5ute3MCV:SiR4sHSvDs4TyG7Mv+Y/IZJC7ov
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1192 1212 rundll32.exe 28 PID 1212 wrote to memory of 1192 1212 rundll32.exe 28 PID 1212 wrote to memory of 1192 1212 rundll32.exe 28 PID 1212 wrote to memory of 1192 1212 rundll32.exe 28 PID 1212 wrote to memory of 1192 1212 rundll32.exe 28 PID 1212 wrote to memory of 1192 1212 rundll32.exe 28 PID 1212 wrote to memory of 1192 1212 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll,#12⤵PID:1192
-