Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
1ce98006a55bd7f52bca3d7af3d32266b2e5fef81d4340a1ed1fd571dfd561a6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ce98006a55bd7f52bca3d7af3d32266b2e5fef81d4340a1ed1fd571dfd561a6.dll
Resource
win10v2004-20231215-en
General
-
Target
1ce98006a55bd7f52bca3d7af3d32266b2e5fef81d4340a1ed1fd571dfd561a6.dll
-
Size
2.9MB
-
MD5
0788065be5962f06315636441a18b2f7
-
SHA1
4b3911575f6275138635cdf2337357fadc81b990
-
SHA256
1ce98006a55bd7f52bca3d7af3d32266b2e5fef81d4340a1ed1fd571dfd561a6
-
SHA512
0bda51c732f0484d4d9c2a2b5990ca62a4bd82a4de0ba9aa543436cc13d4fb6c615409d436c12609775afc1031267f03c11cc0cc9a2ea35e5f52389853c89ea8
-
SSDEEP
49152:ZnVd4HI4VNcgXiOsVeBakVRfB9URCtz6MBRS3h0:ZnVOFiOiaRfB9ISBRa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2352 2288 rundll32.exe 28 PID 2288 wrote to memory of 2352 2288 rundll32.exe 28 PID 2288 wrote to memory of 2352 2288 rundll32.exe 28 PID 2288 wrote to memory of 2352 2288 rundll32.exe 28 PID 2288 wrote to memory of 2352 2288 rundll32.exe 28 PID 2288 wrote to memory of 2352 2288 rundll32.exe 28 PID 2288 wrote to memory of 2352 2288 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ce98006a55bd7f52bca3d7af3d32266b2e5fef81d4340a1ed1fd571dfd561a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ce98006a55bd7f52bca3d7af3d32266b2e5fef81d4340a1ed1fd571dfd561a6.dll,#12⤵PID:2352
-