Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
f72ae3977edd8067f733db6d14db17140bbcc9b7abb0633301dac2d964a24875.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f72ae3977edd8067f733db6d14db17140bbcc9b7abb0633301dac2d964a24875.dll
Resource
win10v2004-20240226-en
General
-
Target
f72ae3977edd8067f733db6d14db17140bbcc9b7abb0633301dac2d964a24875.dll
-
Size
7KB
-
MD5
af73dd80ce2be2ae071aa1cb21663af5
-
SHA1
3f72ccb137f3eb7c40257a682e21f39c7b1a5d39
-
SHA256
f72ae3977edd8067f733db6d14db17140bbcc9b7abb0633301dac2d964a24875
-
SHA512
5c69e3f1e5cc2cc174e9c588daaa3fd9bbd249ada1b57e9e71c406af590216be8239dca0b56e1d08fe2980c3a15bd1c0062bd5bab46310a568211ca384561a9d
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWFbABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbPrq3qX5S2hV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2056 1676 rundll32.exe 28 PID 1676 wrote to memory of 2056 1676 rundll32.exe 28 PID 1676 wrote to memory of 2056 1676 rundll32.exe 28 PID 1676 wrote to memory of 2056 1676 rundll32.exe 28 PID 1676 wrote to memory of 2056 1676 rundll32.exe 28 PID 1676 wrote to memory of 2056 1676 rundll32.exe 28 PID 1676 wrote to memory of 2056 1676 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f72ae3977edd8067f733db6d14db17140bbcc9b7abb0633301dac2d964a24875.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f72ae3977edd8067f733db6d14db17140bbcc9b7abb0633301dac2d964a24875.dll,#12⤵PID:2056
-