Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll
Resource
win10v2004-20230915-en
General
-
Target
736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll
-
Size
70KB
-
MD5
23a29461227519599e73b7d7344df468
-
SHA1
d6b0886056d0ca2a34fa8083640ade30431473d4
-
SHA256
736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b
-
SHA512
85cf8b732c547f0363ddd6e2d21dbe9a7c4c8a6bd8a456bd190ce0c7874c62004245b38704fc3642d2c0b7dcc712306feff653d458f00934bf0e774f922c3bdf
-
SSDEEP
1536:zeJBxp1/+we0Ss1UsoILrAgI9uErsjkIyeaKbRebmz0R8rT4bk:qfT1/+wXWxILEuEUkIxRbRebmwR8ru
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2348 1740 rundll32.exe 28 PID 1740 wrote to memory of 2348 1740 rundll32.exe 28 PID 1740 wrote to memory of 2348 1740 rundll32.exe 28 PID 1740 wrote to memory of 2348 1740 rundll32.exe 28 PID 1740 wrote to memory of 2348 1740 rundll32.exe 28 PID 1740 wrote to memory of 2348 1740 rundll32.exe 28 PID 1740 wrote to memory of 2348 1740 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll,#12⤵PID:2348
-