Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
8dba93544c6f389ad44d212a47a3261bcbe5219d878aa5725d5956b2d5ecd173.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8dba93544c6f389ad44d212a47a3261bcbe5219d878aa5725d5956b2d5ecd173.dll
Resource
win10v2004-20231215-en
General
-
Target
8dba93544c6f389ad44d212a47a3261bcbe5219d878aa5725d5956b2d5ecd173.dll
-
Size
179KB
-
MD5
1fd54b825a8bd5f7644c84bcb1fec9ed
-
SHA1
595e30bcd745c8a0bb437e0190ea3c114ca2f74a
-
SHA256
8dba93544c6f389ad44d212a47a3261bcbe5219d878aa5725d5956b2d5ecd173
-
SHA512
31d03a7a1edf93d50039d773b5ed74a59b2e00832cc15830e6baf29d731fa1fce36ce9f2759ca0618a651dbefba49e6dcabc33dde79d471d3241f918b8e9efcb
-
SSDEEP
3072:nKmXTCIDyzCn0h7B4yTUp9OimOKWaRTYUIMOmVF2lQBV+UdE+rECWp7hKoc:VuIDoxoxmOKR09MOaBV+UdvrEFp7hKJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1936 1240 rundll32.exe 28 PID 1240 wrote to memory of 1936 1240 rundll32.exe 28 PID 1240 wrote to memory of 1936 1240 rundll32.exe 28 PID 1240 wrote to memory of 1936 1240 rundll32.exe 28 PID 1240 wrote to memory of 1936 1240 rundll32.exe 28 PID 1240 wrote to memory of 1936 1240 rundll32.exe 28 PID 1240 wrote to memory of 1936 1240 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dba93544c6f389ad44d212a47a3261bcbe5219d878aa5725d5956b2d5ecd173.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dba93544c6f389ad44d212a47a3261bcbe5219d878aa5725d5956b2d5ecd173.dll,#12⤵PID:1936
-