Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
0dcca323b8fc9e4a3122b0f0ce2c4565fb669657181b4b0d514f97376fec3285.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0dcca323b8fc9e4a3122b0f0ce2c4565fb669657181b4b0d514f97376fec3285.dll
Resource
win10v2004-20231215-en
General
-
Target
0dcca323b8fc9e4a3122b0f0ce2c4565fb669657181b4b0d514f97376fec3285.dll
-
Size
329KB
-
MD5
e7f0595c584798ef9c07ba7c990441bc
-
SHA1
2255de77487480966650881452f45da6321aad4b
-
SHA256
0dcca323b8fc9e4a3122b0f0ce2c4565fb669657181b4b0d514f97376fec3285
-
SHA512
a6aeccac8e73e7f89f7cd754425a42b6b9b9d3efec0bb7875b5110ac6da35cd62233eeaae844db4e6738f4ee73e9ce7a0dc45a135c740da5220b6b79689b03f7
-
SSDEEP
6144:CF2Rx85CzddJK216gQQjjrAYuerAO7AOJrvi:CURxHdd516fQjjrAYuertXi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3024 3020 rundll32.exe 16 PID 3020 wrote to memory of 3024 3020 rundll32.exe 16 PID 3020 wrote to memory of 3024 3020 rundll32.exe 16 PID 3020 wrote to memory of 3024 3020 rundll32.exe 16 PID 3020 wrote to memory of 3024 3020 rundll32.exe 16 PID 3020 wrote to memory of 3024 3020 rundll32.exe 16 PID 3020 wrote to memory of 3024 3020 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0dcca323b8fc9e4a3122b0f0ce2c4565fb669657181b4b0d514f97376fec3285.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0dcca323b8fc9e4a3122b0f0ce2c4565fb669657181b4b0d514f97376fec3285.dll,#12⤵PID:3024
-