Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll
Resource
win10v2004-20240226-en
General
-
Target
7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll
-
Size
179KB
-
MD5
24f78385aa884d28c9fcca053b52dd75
-
SHA1
8d90f2a2462a062a14a37f529babda46d28242a6
-
SHA256
7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d
-
SHA512
14fc3d6f3776b47034a18b676630cddb15aa347e4783cae5d22c2e03c57502a0ed7e46e5999e3b36ae5c35a9cb068378286c91873522a7285786f4c4112e3597
-
SSDEEP
3072:nKmXTCIx9en0h7k4yTUp9OimOKWaRTYUIMOmVF2lQBV+UdE+rECWp7hKN:VuIL5WoxmOKR09MOaBV+UdvrEFp7hKN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3056 2488 rundll32.exe 28 PID 2488 wrote to memory of 3056 2488 rundll32.exe 28 PID 2488 wrote to memory of 3056 2488 rundll32.exe 28 PID 2488 wrote to memory of 3056 2488 rundll32.exe 28 PID 2488 wrote to memory of 3056 2488 rundll32.exe 28 PID 2488 wrote to memory of 3056 2488 rundll32.exe 28 PID 2488 wrote to memory of 3056 2488 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll,#12⤵PID:3056
-