Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll
Resource
win10v2004-20230915-en
General
-
Target
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll
-
Size
9.7MB
-
MD5
60f3272a637d751f03ffdacbb4f46372
-
SHA1
6a42558315e3c21ffda16667e9b3f5255516a3a1
-
SHA256
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a
-
SHA512
5a4dfacde70bda395432ac045102cb71d6b64621d1ec4b6fd2769992037c735e853dacd9f901afdba201d66bf94f51063e2ddae8d63985b487330b46d892bae1
-
SSDEEP
98304:2uffYu2uUfBVh3CPhlz8QV8QkTbyvuyyPUgLrcjiIT1gOSgO8:JkCPhF8QV8QkTbyvuyyPUgn/IGHgO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2184 1720 rundll32.exe 28 PID 1720 wrote to memory of 2184 1720 rundll32.exe 28 PID 1720 wrote to memory of 2184 1720 rundll32.exe 28 PID 1720 wrote to memory of 2184 1720 rundll32.exe 28 PID 1720 wrote to memory of 2184 1720 rundll32.exe 28 PID 1720 wrote to memory of 2184 1720 rundll32.exe 28 PID 1720 wrote to memory of 2184 1720 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll,#12⤵PID:2184
-