Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 20:43
Static task
static1
Behavioral task
behavioral1
Sample
184cbf7df459c6266184ad6f241c66805a4301aa198920465a6756ee073d6801.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
184cbf7df459c6266184ad6f241c66805a4301aa198920465a6756ee073d6801.dll
Resource
win10v2004-20231025-en
General
-
Target
184cbf7df459c6266184ad6f241c66805a4301aa198920465a6756ee073d6801.dll
-
Size
298KB
-
MD5
9bf777a32e84db48ce71e1e06fafd441
-
SHA1
ccfc23046955a103b3835023a3468d6dc2ffd01f
-
SHA256
184cbf7df459c6266184ad6f241c66805a4301aa198920465a6756ee073d6801
-
SHA512
dbf04c347a531b8856e2a87af85cde09d444ada6fcd362ba77e6122f7ce85996a4cc338e66bcc10ea0a5980e3d5ac5431d231488d274197f78fcb8e5fee4a1d5
-
SSDEEP
6144:CHzp4qIDRd6EqFmcCBk9LHZEPSZ/Of626BioBRXFsjf3FOUXzsezZOyMm:izp4qIDqRi8ZEatP26BzzUP
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2888 set thread context of 2316 2888 rundll32.exe notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2888 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
rundll32.exedescription pid process target process PID 2888 wrote to memory of 2316 2888 rundll32.exe notepad.exe PID 2888 wrote to memory of 2316 2888 rundll32.exe notepad.exe PID 2888 wrote to memory of 2316 2888 rundll32.exe notepad.exe PID 2888 wrote to memory of 2316 2888 rundll32.exe notepad.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\184cbf7df459c6266184ad6f241c66805a4301aa198920465a6756ee073d6801.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\notepad.exenotepad.exe2⤵