Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
4a23864c9fd985bf00bf2158df3fdacf8ae17e0c7f6543f691dbd2916bc47cdd.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a23864c9fd985bf00bf2158df3fdacf8ae17e0c7f6543f691dbd2916bc47cdd.dll
Resource
win10v2004-20231215-en
General
-
Target
4a23864c9fd985bf00bf2158df3fdacf8ae17e0c7f6543f691dbd2916bc47cdd.dll
-
Size
2.1MB
-
MD5
8e019f403c0a5713dad77595bf6d7c1d
-
SHA1
d0b5b54b7e593021067ac995488de10d4db908ac
-
SHA256
4a23864c9fd985bf00bf2158df3fdacf8ae17e0c7f6543f691dbd2916bc47cdd
-
SHA512
4a9cd9c972e429e51e12ebeb685b2195ebd61ea98146d002c9a83b8754baa887e56710aa09f281e2f514df3fe620420c98e4ccd5a7248d23afbcf27627c6b8da
-
SSDEEP
49152:y8feI79oK2xUrHvV1PBbhJ/P0BDpinATs75a78tfG:y8D7WK2UNtmBDpgh08tu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2320 2180 rundll32.exe 28 PID 2180 wrote to memory of 2320 2180 rundll32.exe 28 PID 2180 wrote to memory of 2320 2180 rundll32.exe 28 PID 2180 wrote to memory of 2320 2180 rundll32.exe 28 PID 2180 wrote to memory of 2320 2180 rundll32.exe 28 PID 2180 wrote to memory of 2320 2180 rundll32.exe 28 PID 2180 wrote to memory of 2320 2180 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a23864c9fd985bf00bf2158df3fdacf8ae17e0c7f6543f691dbd2916bc47cdd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a23864c9fd985bf00bf2158df3fdacf8ae17e0c7f6543f691dbd2916bc47cdd.dll,#12⤵PID:2320
-