Analysis
-
max time kernel
117s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
7b9845bc8df12f3f431ed0a9c414b04a1e6f17cc9ced7c0ab835d7cd925eb464.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b9845bc8df12f3f431ed0a9c414b04a1e6f17cc9ced7c0ab835d7cd925eb464.dll
Resource
win10v2004-20231215-en
General
-
Target
7b9845bc8df12f3f431ed0a9c414b04a1e6f17cc9ced7c0ab835d7cd925eb464.dll
-
Size
372KB
-
MD5
72c65d127327132c47ded1e3f6b338e5
-
SHA1
50e79b1654a9a17200a55cda577f7c1f80fa6919
-
SHA256
7b9845bc8df12f3f431ed0a9c414b04a1e6f17cc9ced7c0ab835d7cd925eb464
-
SHA512
cbe4e7b34abb9d9fbd33ee5d8793022f9cdcce766c5034c52f1fc42e451c7175f0e2193423fa41758e3e410f29176316e1f2bd6f5a66f05dde1d254ad6b3e032
-
SSDEEP
6144:/aRg1TaB+NOfapDIIVmZswkP0jyeza2i6SsnmNV6qA6qNx3:/flVmZtksk2d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 2764 3688 rundll32.exe 14 PID 3688 wrote to memory of 2764 3688 rundll32.exe 14 PID 3688 wrote to memory of 2764 3688 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b9845bc8df12f3f431ed0a9c414b04a1e6f17cc9ced7c0ab835d7cd925eb464.dll,#11⤵PID:2764
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b9845bc8df12f3f431ed0a9c414b04a1e6f17cc9ced7c0ab835d7cd925eb464.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3688