Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30-08-2023 03:13
Static task
static1
Behavioral task
behavioral1
Sample
ec54d59d993cbd6bf276a3dbd22c80e8f3db168f41f23d64b005d13ea4817b5d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ec54d59d993cbd6bf276a3dbd22c80e8f3db168f41f23d64b005d13ea4817b5d.dll
Resource
win10v2004-20230703-en
General
-
Target
ec54d59d993cbd6bf276a3dbd22c80e8f3db168f41f23d64b005d13ea4817b5d.dll
-
Size
4.1MB
-
MD5
c0a94e4100971fb0c09d10bae47b7047
-
SHA1
1d316dfebd5c5902e61f06ae18c30969de6d1ee1
-
SHA256
ec54d59d993cbd6bf276a3dbd22c80e8f3db168f41f23d64b005d13ea4817b5d
-
SHA512
1ba37bbdf1c24218cc69487f842e9c292be0945cc6dcaca7d1b2816d8c8e8aaab10d1d26d869a55c17a1c2322166ff4881a57e9092294620b2ec5c97c1f84691
-
SSDEEP
49152:Z+soX76qXnM+qCA2y/hFcwl0eWob4YjR9QaAe+RyptIWM01ZA9+Yc7WDSmZ4P1I/:Z+sopXWjcteps4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2564 2224 rundll32.exe 28 PID 2224 wrote to memory of 2564 2224 rundll32.exe 28 PID 2224 wrote to memory of 2564 2224 rundll32.exe 28 PID 2224 wrote to memory of 2564 2224 rundll32.exe 28 PID 2224 wrote to memory of 2564 2224 rundll32.exe 28 PID 2224 wrote to memory of 2564 2224 rundll32.exe 28 PID 2224 wrote to memory of 2564 2224 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec54d59d993cbd6bf276a3dbd22c80e8f3db168f41f23d64b005d13ea4817b5d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec54d59d993cbd6bf276a3dbd22c80e8f3db168f41f23d64b005d13ea4817b5d.dll,#12⤵PID:2564
-