Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
89ea84aa00dba5fab90071a8ba53f1e3bca12543940ff317377a6ec4efc62cf5.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
89ea84aa00dba5fab90071a8ba53f1e3bca12543940ff317377a6ec4efc62cf5.dll
Resource
win10v2004-20240226-en
General
-
Target
89ea84aa00dba5fab90071a8ba53f1e3bca12543940ff317377a6ec4efc62cf5.dll
-
Size
6KB
-
MD5
20674567f8b7fa3724d69c57aa2c062b
-
SHA1
5738b8bd5cb8dbbf324ad20bc30c9aa5772fe4bd
-
SHA256
89ea84aa00dba5fab90071a8ba53f1e3bca12543940ff317377a6ec4efc62cf5
-
SHA512
7a0c88ad8eb59a6dc312d5bfdcb9f00e4b183da10082f86ee17c9eb72bc291defe5e079b7cafd6a4f93e32cb1507f88b861f8406265123d0d5b87868d378f487
-
SSDEEP
96:hy859x0P8Mav9Fvc+kJke8yVodA7/iajTjdYeKxBossdG8u9:F5oLwFAR1SA7/TZLVG8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2124 2080 rundll32.exe 28 PID 2080 wrote to memory of 2124 2080 rundll32.exe 28 PID 2080 wrote to memory of 2124 2080 rundll32.exe 28 PID 2080 wrote to memory of 2124 2080 rundll32.exe 28 PID 2080 wrote to memory of 2124 2080 rundll32.exe 28 PID 2080 wrote to memory of 2124 2080 rundll32.exe 28 PID 2080 wrote to memory of 2124 2080 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89ea84aa00dba5fab90071a8ba53f1e3bca12543940ff317377a6ec4efc62cf5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89ea84aa00dba5fab90071a8ba53f1e3bca12543940ff317377a6ec4efc62cf5.dll,#12⤵PID:2124
-