Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
6e5cc55891674a81bdbc352d752430f24008a2f3726ed81abb7864535726bb6e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6e5cc55891674a81bdbc352d752430f24008a2f3726ed81abb7864535726bb6e.dll
Resource
win10v2004-20231215-en
General
-
Target
6e5cc55891674a81bdbc352d752430f24008a2f3726ed81abb7864535726bb6e.dll
-
Size
11.3MB
-
MD5
ba57a47aff8fce4a4944ced3ace36527
-
SHA1
4e48e19475e5e9b92fa6cdb1603571832c4dac94
-
SHA256
6e5cc55891674a81bdbc352d752430f24008a2f3726ed81abb7864535726bb6e
-
SHA512
5ea876ce034866542d1d1e9cd6f4d95a57dd15a04cee6c19096665fbff53231d4c68795d3613b3eca9d70790064529a045c73a1bf5dc45080f6a7962d2de5d1e
-
SSDEEP
196608:3cbTpLNYv74z9m6L1wjQbGGguN1yAuqNcX83O+VrZqs6E2lqraQyQ3qqxFETD:3c3kvg1WFG3cqNcX831Fr2ma5SHKD
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 rundll32.exe 1912 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1912 3020 rundll32.exe 15 PID 3020 wrote to memory of 1912 3020 rundll32.exe 15 PID 3020 wrote to memory of 1912 3020 rundll32.exe 15 PID 3020 wrote to memory of 1912 3020 rundll32.exe 15 PID 3020 wrote to memory of 1912 3020 rundll32.exe 15 PID 3020 wrote to memory of 1912 3020 rundll32.exe 15 PID 3020 wrote to memory of 1912 3020 rundll32.exe 15
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e5cc55891674a81bdbc352d752430f24008a2f3726ed81abb7864535726bb6e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e5cc55891674a81bdbc352d752430f24008a2f3726ed81abb7864535726bb6e.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-