Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
df984706d9d3d01d2fbee6226be3713503dce60e0a637ffb467a74e84a5ce9f2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
df984706d9d3d01d2fbee6226be3713503dce60e0a637ffb467a74e84a5ce9f2.dll
Resource
win10v2004-20240220-en
General
-
Target
df984706d9d3d01d2fbee6226be3713503dce60e0a637ffb467a74e84a5ce9f2.dll
-
Size
51KB
-
MD5
d7d3bb4c6c6a1cc34dbd4112f86c77e5
-
SHA1
e9c8bc901d0cde7fa8d54906f35ca7a28c861a8c
-
SHA256
df984706d9d3d01d2fbee6226be3713503dce60e0a637ffb467a74e84a5ce9f2
-
SHA512
48f7c863c746d7ac0edb0b9162de0041721def14eb1ba1cf0b813c990324304b5351c6fe4aff91271bfab818841f7ee21ab51f521686451456f3e7a13e313fbf
-
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezKsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBppMC6H
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2248 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2248 3016 rundll32.exe 28 PID 3016 wrote to memory of 2248 3016 rundll32.exe 28 PID 3016 wrote to memory of 2248 3016 rundll32.exe 28 PID 3016 wrote to memory of 2248 3016 rundll32.exe 28 PID 3016 wrote to memory of 2248 3016 rundll32.exe 28 PID 3016 wrote to memory of 2248 3016 rundll32.exe 28 PID 3016 wrote to memory of 2248 3016 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df984706d9d3d01d2fbee6226be3713503dce60e0a637ffb467a74e84a5ce9f2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df984706d9d3d01d2fbee6226be3713503dce60e0a637ffb467a74e84a5ce9f2.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2248
-