Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
68129bd2f7a6e3a657f03373e5ae32ff821a8b7c37ad545f99cf0a7d8f8d2d78.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68129bd2f7a6e3a657f03373e5ae32ff821a8b7c37ad545f99cf0a7d8f8d2d78.dll
Resource
win10v2004-20240226-en
General
-
Target
68129bd2f7a6e3a657f03373e5ae32ff821a8b7c37ad545f99cf0a7d8f8d2d78.dll
-
Size
5KB
-
MD5
5995da45ce5159307ef89f6301670526
-
SHA1
cbc6deba863ff7a1097fa89f07a1a98ffcc6c72d
-
SHA256
68129bd2f7a6e3a657f03373e5ae32ff821a8b7c37ad545f99cf0a7d8f8d2d78
-
SHA512
897cf7b4f92cfce249af7808bc5281a7ed59ed06909f95dddec04f5cecb0ecedcff0ff952e5a4d9275a2f495364399ae5bd9b45740fdd8bf693de864e7758249
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqioKdrCwOnjjrIWuYl2sTQGFnCIH37vJ:hy859x0P8MaixJYvrIWL2s4IX7vJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1704 2232 rundll32.exe 28 PID 2232 wrote to memory of 1704 2232 rundll32.exe 28 PID 2232 wrote to memory of 1704 2232 rundll32.exe 28 PID 2232 wrote to memory of 1704 2232 rundll32.exe 28 PID 2232 wrote to memory of 1704 2232 rundll32.exe 28 PID 2232 wrote to memory of 1704 2232 rundll32.exe 28 PID 2232 wrote to memory of 1704 2232 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\68129bd2f7a6e3a657f03373e5ae32ff821a8b7c37ad545f99cf0a7d8f8d2d78.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\68129bd2f7a6e3a657f03373e5ae32ff821a8b7c37ad545f99cf0a7d8f8d2d78.dll,#12⤵PID:1704
-