Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-09-2023 02:34
Static task
static1
Behavioral task
behavioral1
Sample
f63f520666a99435e3e512889845347cb7030c95282a3d8d57d3b1967c6e16e0.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f63f520666a99435e3e512889845347cb7030c95282a3d8d57d3b1967c6e16e0.dll
Resource
win10v2004-20230831-en
General
-
Target
f63f520666a99435e3e512889845347cb7030c95282a3d8d57d3b1967c6e16e0.dll
-
Size
5.1MB
-
MD5
da9a8425ebf6092af38c6c557b9a10de
-
SHA1
dd5947e7d4e65c1a7480ef7bac83578f1e4d7e52
-
SHA256
f63f520666a99435e3e512889845347cb7030c95282a3d8d57d3b1967c6e16e0
-
SHA512
40cb6b79ec92833797804dde86799cb00bac9c24cd41714357c0ad4391fbb7d9e1f7659c1a580b63efbcd1e7e8bc9c0c3b196b8581d9dc5e678ab56c5f85a2f4
-
SSDEEP
98304:16666666666666666666666666666666x666666666666666fwwwwwwwwwwwwww9:DkdjCSDmttPPVNi94P5yQguR/QZo1Mt+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1748 1964 rundll32.exe 28 PID 1964 wrote to memory of 1748 1964 rundll32.exe 28 PID 1964 wrote to memory of 1748 1964 rundll32.exe 28 PID 1964 wrote to memory of 1748 1964 rundll32.exe 28 PID 1964 wrote to memory of 1748 1964 rundll32.exe 28 PID 1964 wrote to memory of 1748 1964 rundll32.exe 28 PID 1964 wrote to memory of 1748 1964 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f63f520666a99435e3e512889845347cb7030c95282a3d8d57d3b1967c6e16e0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f63f520666a99435e3e512889845347cb7030c95282a3d8d57d3b1967c6e16e0.dll,#12⤵PID:1748
-