Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 20:38
Static task
static1
Behavioral task
behavioral1
Sample
132e697a1a9b192a104528aed44ed00af83d1fb4575a1e455b835e8b735f107f.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
132e697a1a9b192a104528aed44ed00af83d1fb4575a1e455b835e8b735f107f.dll
Resource
win10v2004-20231023-en
General
-
Target
132e697a1a9b192a104528aed44ed00af83d1fb4575a1e455b835e8b735f107f.dll
-
Size
4.7MB
-
MD5
8519162f4f087d3fa6745d0de1d2e442
-
SHA1
b36c5f81d52969c8390905d904d539c9dfe2298d
-
SHA256
132e697a1a9b192a104528aed44ed00af83d1fb4575a1e455b835e8b735f107f
-
SHA512
89105a124419dc2503ad2d9df690fcecc1cab18fd7b1b408735fe1e55047033865c41a647b5a90243990460a683f878bb7097a80b727136290063713e13fa0b6
-
SSDEEP
98304:jKP1rAG1vNNuf5hUViQaBYZQm9q0AenLpDghdKR2oZRGCeKqvqI:uP1r1N4f5hUViQaBYZJoKLpDghdKR3Zr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2664 1816 rundll32.exe 27 PID 1816 wrote to memory of 2664 1816 rundll32.exe 27 PID 1816 wrote to memory of 2664 1816 rundll32.exe 27 PID 1816 wrote to memory of 2664 1816 rundll32.exe 27 PID 1816 wrote to memory of 2664 1816 rundll32.exe 27 PID 1816 wrote to memory of 2664 1816 rundll32.exe 27 PID 1816 wrote to memory of 2664 1816 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\132e697a1a9b192a104528aed44ed00af83d1fb4575a1e455b835e8b735f107f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\132e697a1a9b192a104528aed44ed00af83d1fb4575a1e455b835e8b735f107f.dll,#12⤵PID:2664
-