Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 18:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
037ffe99d2ef6ae643ffc0e29b1d36c20e1efceb9c3efaf58ef13bbfd4c460b4.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
037ffe99d2ef6ae643ffc0e29b1d36c20e1efceb9c3efaf58ef13bbfd4c460b4.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
037ffe99d2ef6ae643ffc0e29b1d36c20e1efceb9c3efaf58ef13bbfd4c460b4.dll
-
Size
7KB
-
MD5
d7276fa6588bb4c37e1dac3c365b96a6
-
SHA1
c95305f439cc43d72f265985c00c2d9d14043f3a
-
SHA256
037ffe99d2ef6ae643ffc0e29b1d36c20e1efceb9c3efaf58ef13bbfd4c460b4
-
SHA512
1c5002f9a3979062d5df92fe37b707d68177911472fac588e1ca90a5ad26ad75e082c5af3f60699223ec1251fa6f705a8137ded21100e10cd72992e27b1f87f6
-
SSDEEP
96:wb4VHccYJUC/aFbz/j0OvaPbd3cX5aXW:wUaJf/aFbP0O42JaX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2088 1436 rundll32.exe 28 PID 1436 wrote to memory of 2088 1436 rundll32.exe 28 PID 1436 wrote to memory of 2088 1436 rundll32.exe 28 PID 1436 wrote to memory of 2088 1436 rundll32.exe 28 PID 1436 wrote to memory of 2088 1436 rundll32.exe 28 PID 1436 wrote to memory of 2088 1436 rundll32.exe 28 PID 1436 wrote to memory of 2088 1436 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\037ffe99d2ef6ae643ffc0e29b1d36c20e1efceb9c3efaf58ef13bbfd4c460b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\037ffe99d2ef6ae643ffc0e29b1d36c20e1efceb9c3efaf58ef13bbfd4c460b4.dll,#12⤵PID:2088
-