Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
33c2d7796be582c1ba057d26d963d3718c503802866aa207701b610c02f211ba.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
33c2d7796be582c1ba057d26d963d3718c503802866aa207701b610c02f211ba.dll
Resource
win10v2004-20230703-en
General
-
Target
33c2d7796be582c1ba057d26d963d3718c503802866aa207701b610c02f211ba.dll
-
Size
187KB
-
MD5
0903137db5d5a82d3965300c9c96c822
-
SHA1
7add00775bba6da3a9cd232588faf7e092b20433
-
SHA256
33c2d7796be582c1ba057d26d963d3718c503802866aa207701b610c02f211ba
-
SHA512
14ea492531a93dd5eb5d9643386392b17945694c4ad4bde0e9d5d0c5a98d6c0d44dd69369f4b1654943e348bf81ff84e2785a087eb3013ff158cedd25af7f89b
-
SSDEEP
1536:BAWuODOWeyaadVRRbYQp8qsCEmxZR8zaCsFY3AlhY9RvX4RhnlZFBmte:KqpRsCODQ7qRPAlB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2776 1920 rundll32.exe 28 PID 1920 wrote to memory of 2776 1920 rundll32.exe 28 PID 1920 wrote to memory of 2776 1920 rundll32.exe 28 PID 1920 wrote to memory of 2776 1920 rundll32.exe 28 PID 1920 wrote to memory of 2776 1920 rundll32.exe 28 PID 1920 wrote to memory of 2776 1920 rundll32.exe 28 PID 1920 wrote to memory of 2776 1920 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33c2d7796be582c1ba057d26d963d3718c503802866aa207701b610c02f211ba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33c2d7796be582c1ba057d26d963d3718c503802866aa207701b610c02f211ba.dll,#12⤵PID:2776
-