Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:46
Behavioral task
behavioral1
Sample
7520b966d72af662b5ff0f04e2d9f44d.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
7520b966d72af662b5ff0f04e2d9f44d.dll
-
Size
88KB
-
MD5
7520b966d72af662b5ff0f04e2d9f44d
-
SHA1
5d55692b69236d99e5c396d530b3b17d064d54f8
-
SHA256
e80a450921acadf87614f81bccf0ef39cd95304719885368776cc77c6e01f8ec
-
SHA512
287ed1512c4f8ac09dd0da1ac6bccb5a3bbbcb913eba1c83d9b7266f08692427ba9dc167c27ac02f9ab9f0f2ed0cad3dde94e18c319be22e4083d343755ea3b8
-
SSDEEP
1536:FPx1BXEVnPdTG8rbWtaYc5Zykfxc8MrBZmTksXz:FPxzUt88WaY+ZyWxc82BZmTksXz
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3432 wrote to memory of 4956 3432 rundll32.exe rundll32.exe PID 3432 wrote to memory of 4956 3432 rundll32.exe rundll32.exe PID 3432 wrote to memory of 4956 3432 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7520b966d72af662b5ff0f04e2d9f44d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7520b966d72af662b5ff0f04e2d9f44d.dll,#12⤵
- Drops file in Drivers directory
PID:4956