Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
3f5518eea6b3b56d1b6e4391f6a6b85ad5b68fe5936adf7120f9bd72d38a281a.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3f5518eea6b3b56d1b6e4391f6a6b85ad5b68fe5936adf7120f9bd72d38a281a.dll
Resource
win10v2004-20230915-en
General
-
Target
3f5518eea6b3b56d1b6e4391f6a6b85ad5b68fe5936adf7120f9bd72d38a281a.dll
-
Size
2.1MB
-
MD5
c0cd92cfc0bda16943caf560c1985fcb
-
SHA1
4bf33428dc4b244993fba898d9c2a5ce137014a9
-
SHA256
3f5518eea6b3b56d1b6e4391f6a6b85ad5b68fe5936adf7120f9bd72d38a281a
-
SHA512
1d9c808e233f3a0c14ab240d94a7f3e93057e74a3abe05f46062d792416900586911763fbe12bb01a39332bb589309f355cf4c1f13520c86be7cc3dc41af6ad6
-
SSDEEP
49152:vpz84B8m/mJoQAXJmvmEfZOkNPSTqctjRTDpJMMx:B7qm/eMc1PSTqsL5x
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2040 1704 rundll32.exe 28 PID 1704 wrote to memory of 2040 1704 rundll32.exe 28 PID 1704 wrote to memory of 2040 1704 rundll32.exe 28 PID 1704 wrote to memory of 2040 1704 rundll32.exe 28 PID 1704 wrote to memory of 2040 1704 rundll32.exe 28 PID 1704 wrote to memory of 2040 1704 rundll32.exe 28 PID 1704 wrote to memory of 2040 1704 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f5518eea6b3b56d1b6e4391f6a6b85ad5b68fe5936adf7120f9bd72d38a281a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f5518eea6b3b56d1b6e4391f6a6b85ad5b68fe5936adf7120f9bd72d38a281a.dll,#12⤵PID:2040
-