Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 14:40
Static task
static1
Behavioral task
behavioral1
Sample
6d2231b00672517c2094e5abcc844a1a6c06ce43203b5f5b4ccf2a5cef5080a5.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6d2231b00672517c2094e5abcc844a1a6c06ce43203b5f5b4ccf2a5cef5080a5.dll
Resource
win10v2004-20231020-en
General
-
Target
6d2231b00672517c2094e5abcc844a1a6c06ce43203b5f5b4ccf2a5cef5080a5.dll
-
Size
2.1MB
-
MD5
d6cd4d73a5f3a984fb08e38efca9d764
-
SHA1
7194f2bf72b8c7e48d1f5d78a8284e76d6d555fd
-
SHA256
6d2231b00672517c2094e5abcc844a1a6c06ce43203b5f5b4ccf2a5cef5080a5
-
SHA512
31e4c27e262c899e8359fcea779ece2a16cb2e9691d00d949d9d95bb3b60582ef21da3d1c11acd18079ca1247854321808010a7d402230c96f22febe513402e1
-
SSDEEP
49152:vcz84Bxm/mJoQAXJmMmEfZOkNPSTqctjRTDpJMMD+:k7rm/eMcGPSTqsL5K
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2260 1716 rundll32.exe 28 PID 1716 wrote to memory of 2260 1716 rundll32.exe 28 PID 1716 wrote to memory of 2260 1716 rundll32.exe 28 PID 1716 wrote to memory of 2260 1716 rundll32.exe 28 PID 1716 wrote to memory of 2260 1716 rundll32.exe 28 PID 1716 wrote to memory of 2260 1716 rundll32.exe 28 PID 1716 wrote to memory of 2260 1716 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d2231b00672517c2094e5abcc844a1a6c06ce43203b5f5b4ccf2a5cef5080a5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d2231b00672517c2094e5abcc844a1a6c06ce43203b5f5b4ccf2a5cef5080a5.dll,#12⤵PID:2260
-