Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
a321ea7e824b7e4c12e5a9687213934d7e3ca7bf50690478c7af6cf381deeb5f.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a321ea7e824b7e4c12e5a9687213934d7e3ca7bf50690478c7af6cf381deeb5f.dll
Resource
win10v2004-20230915-en
General
-
Target
a321ea7e824b7e4c12e5a9687213934d7e3ca7bf50690478c7af6cf381deeb5f.dll
-
Size
4.3MB
-
MD5
97bc74d88c5e2ec2b66f0d777c976805
-
SHA1
0969471b278bb035325c4ef9e44105176f369373
-
SHA256
a321ea7e824b7e4c12e5a9687213934d7e3ca7bf50690478c7af6cf381deeb5f
-
SHA512
d3c2f6efb32f321a30e8747e39dce6994a68babc5a1b4da33f856ff05bcdb7c41a8e0a8334dd5d6827d8761bc7dc2cab2b0eb086b3e1e732404ba26ab642e827
-
SSDEEP
98304:4RPw6S+krZJD+dt/Deqv7evDDHDXrXtfEo+z/:t+krZtgzevLTtfEoG/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3012 3004 rundll32.exe 28 PID 3004 wrote to memory of 3012 3004 rundll32.exe 28 PID 3004 wrote to memory of 3012 3004 rundll32.exe 28 PID 3004 wrote to memory of 3012 3004 rundll32.exe 28 PID 3004 wrote to memory of 3012 3004 rundll32.exe 28 PID 3004 wrote to memory of 3012 3004 rundll32.exe 28 PID 3004 wrote to memory of 3012 3004 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a321ea7e824b7e4c12e5a9687213934d7e3ca7bf50690478c7af6cf381deeb5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a321ea7e824b7e4c12e5a9687213934d7e3ca7bf50690478c7af6cf381deeb5f.dll,#12⤵PID:3012
-