Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 05:45
Static task
static1
Behavioral task
behavioral1
Sample
94e4394722b0ac35fb2098c6eb10a700ae05e991542022fb2b8656aa5eef1352.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
94e4394722b0ac35fb2098c6eb10a700ae05e991542022fb2b8656aa5eef1352.dll
Resource
win10v2004-20230915-en
General
-
Target
94e4394722b0ac35fb2098c6eb10a700ae05e991542022fb2b8656aa5eef1352.dll
-
Size
2.4MB
-
MD5
e3406e1ea86c129751e1733e0936b091
-
SHA1
27abbaee8060e93de8da3ee941816334cb9578e4
-
SHA256
94e4394722b0ac35fb2098c6eb10a700ae05e991542022fb2b8656aa5eef1352
-
SHA512
69405cb83e6de78f87f69affefe8d1a0882fc05b6b7c3956b616a6330e51f7a8faf8a06338366a6dd8e719e3a68f46add7627d1a0be61091df7dbdc68e63518b
-
SSDEEP
49152:4udaVP0XNRaLoeWK74BATSEKn18fwE1viO1J62V2wfCJVZadmLH9z8zWH:4vCXOcK7aPa9fiTeGH2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1168 rundll32.exe 1168 rundll32.exe 1168 rundll32.exe 1168 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1168 1336 rundll32.exe 28 PID 1336 wrote to memory of 1168 1336 rundll32.exe 28 PID 1336 wrote to memory of 1168 1336 rundll32.exe 28 PID 1336 wrote to memory of 1168 1336 rundll32.exe 28 PID 1336 wrote to memory of 1168 1336 rundll32.exe 28 PID 1336 wrote to memory of 1168 1336 rundll32.exe 28 PID 1336 wrote to memory of 1168 1336 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94e4394722b0ac35fb2098c6eb10a700ae05e991542022fb2b8656aa5eef1352.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94e4394722b0ac35fb2098c6eb10a700ae05e991542022fb2b8656aa5eef1352.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-