Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll
Resource
win10v2004-20240220-en
General
-
Target
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll
-
Size
187KB
-
MD5
6160dde73e3613b7b24b6300f180d0bf
-
SHA1
d4745b0efdd0a25af81606e6212c772212061f68
-
SHA256
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c
-
SHA512
f9b9005e880096c1454f9d6c14d9c0f72b7496648ea6cda1b140e4abfea4273c7b22665b1ffc6e48a9d24a9b591f782ed423e834738fe99216f533700b5b9aeb
-
SSDEEP
3072:fFYHf3/BnZSQ/Y7zJAW3mOKWa84x6BMyblflFj2lQBV+UdE+rECWp7hKSjC:fF0ffYdTmOK8S6BMyxddBV+UdvrEFp7k
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2808 2804 rundll32.exe 28 PID 2804 wrote to memory of 2808 2804 rundll32.exe 28 PID 2804 wrote to memory of 2808 2804 rundll32.exe 28 PID 2804 wrote to memory of 2808 2804 rundll32.exe 28 PID 2804 wrote to memory of 2808 2804 rundll32.exe 28 PID 2804 wrote to memory of 2808 2804 rundll32.exe 28 PID 2804 wrote to memory of 2808 2804 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll,#12⤵PID:2808
-