Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-10-2023 18:03
Static task
static1
Behavioral task
behavioral1
Sample
3c4e667e65abaebf029f6726b5e2997baab80b8ac0abcb1ba5c03dc017e1138b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3c4e667e65abaebf029f6726b5e2997baab80b8ac0abcb1ba5c03dc017e1138b.dll
Resource
win10v2004-20230915-en
General
-
Target
3c4e667e65abaebf029f6726b5e2997baab80b8ac0abcb1ba5c03dc017e1138b.dll
-
Size
2.8MB
-
MD5
5d8062753f4e3431f0b2f8cbc3eef026
-
SHA1
9d5f5be5e011bceb23d8b712c138ce6c1adb6bec
-
SHA256
3c4e667e65abaebf029f6726b5e2997baab80b8ac0abcb1ba5c03dc017e1138b
-
SHA512
67e132f6ec13e491e400e9802eb6003f510a857a855e60bb54ff392897886fe2de57e1d944388cfb5394595beb51c703dfb9789cf6f9ece0410e3e99875c7113
-
SSDEEP
49152:XbdUgMVzGaEHrgncuKIS8Q1Zljgs3J/2CBbMzxoSm1RMBEN:rdQyLrgcuKIS7+KxK81ay
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2424 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2424 1888 rundll32.exe 28 PID 1888 wrote to memory of 2424 1888 rundll32.exe 28 PID 1888 wrote to memory of 2424 1888 rundll32.exe 28 PID 1888 wrote to memory of 2424 1888 rundll32.exe 28 PID 1888 wrote to memory of 2424 1888 rundll32.exe 28 PID 1888 wrote to memory of 2424 1888 rundll32.exe 28 PID 1888 wrote to memory of 2424 1888 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c4e667e65abaebf029f6726b5e2997baab80b8ac0abcb1ba5c03dc017e1138b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c4e667e65abaebf029f6726b5e2997baab80b8ac0abcb1ba5c03dc017e1138b.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2424
-