Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
e424a3c6971d9fac09357dc30d5c6b3d2661f208e1291bd68c9d83165f18d784.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e424a3c6971d9fac09357dc30d5c6b3d2661f208e1291bd68c9d83165f18d784.dll
Resource
win10v2004-20230703-en
General
-
Target
e424a3c6971d9fac09357dc30d5c6b3d2661f208e1291bd68c9d83165f18d784.dll
-
Size
36KB
-
MD5
0c85ba7f64fe4b9594a950a983438567
-
SHA1
e6d28ced8406d09a01e8e6cf84a86ff54d4803ea
-
SHA256
e424a3c6971d9fac09357dc30d5c6b3d2661f208e1291bd68c9d83165f18d784
-
SHA512
095443c22c4385f2f73f79b4964fb0c891b4a1c2c04efa88b0a98e27a7ba248d576d42e5c3e5b5c7924813b9bdc5e981b06a570a9f104cca3fea8d0067444c45
-
SSDEEP
768:gFIRn/FweO7glOm4UL8g2kRVKSfycTZSvsPGVpHAOG8dzZf:gMtyrm4U4gdhycTZSvsPGV2OG0zp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2216 2196 rundll32.exe 28 PID 2196 wrote to memory of 2216 2196 rundll32.exe 28 PID 2196 wrote to memory of 2216 2196 rundll32.exe 28 PID 2196 wrote to memory of 2216 2196 rundll32.exe 28 PID 2196 wrote to memory of 2216 2196 rundll32.exe 28 PID 2196 wrote to memory of 2216 2196 rundll32.exe 28 PID 2196 wrote to memory of 2216 2196 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e424a3c6971d9fac09357dc30d5c6b3d2661f208e1291bd68c9d83165f18d784.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e424a3c6971d9fac09357dc30d5c6b3d2661f208e1291bd68c9d83165f18d784.dll,#12⤵PID:2216
-