Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
51b5ce3726138b773f755bfd5e90d35f95e1c63656982e651129eec2d3b50fe6.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
51b5ce3726138b773f755bfd5e90d35f95e1c63656982e651129eec2d3b50fe6.dll
Resource
win10v2004-20240319-en
General
-
Target
51b5ce3726138b773f755bfd5e90d35f95e1c63656982e651129eec2d3b50fe6.dll
-
Size
7KB
-
MD5
eb8cdf588b7b529b5d01bda0373297a4
-
SHA1
98843d7a098358de2ee6e908198e3e4bc22a120e
-
SHA256
51b5ce3726138b773f755bfd5e90d35f95e1c63656982e651129eec2d3b50fe6
-
SHA512
4f4d12cea5a7459104090ef8ac7e6c72fe82e2cd63c0e935c871eb13c7bd5d7de6fdd8a671e5e8603ab92ac805f1a71e2d1bcd107e830dfc75c26501be502ea9
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWebABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbPgq3qX5S2hV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1920 1600 rundll32.exe 28 PID 1600 wrote to memory of 1920 1600 rundll32.exe 28 PID 1600 wrote to memory of 1920 1600 rundll32.exe 28 PID 1600 wrote to memory of 1920 1600 rundll32.exe 28 PID 1600 wrote to memory of 1920 1600 rundll32.exe 28 PID 1600 wrote to memory of 1920 1600 rundll32.exe 28 PID 1600 wrote to memory of 1920 1600 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51b5ce3726138b773f755bfd5e90d35f95e1c63656982e651129eec2d3b50fe6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51b5ce3726138b773f755bfd5e90d35f95e1c63656982e651129eec2d3b50fe6.dll,#12⤵PID:1920
-