Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
4bdc63acbbdc6f332d710327cae95825e517e5023c8c3d708433d4adbd905565.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bdc63acbbdc6f332d710327cae95825e517e5023c8c3d708433d4adbd905565.dll
Resource
win10v2004-20240226-en
General
-
Target
4bdc63acbbdc6f332d710327cae95825e517e5023c8c3d708433d4adbd905565.dll
-
Size
1.2MB
-
MD5
cdb4cd72622317fd3203b5dd2da451a0
-
SHA1
60e59b18f77aa4ffe7b94300c2d0ae3f119c68b7
-
SHA256
4bdc63acbbdc6f332d710327cae95825e517e5023c8c3d708433d4adbd905565
-
SHA512
ce929a9c39d8feda6962412121c1fbc481885e8a4bef24c537aae655c0ecf52fda80af316ba945684517f4f7414f9ed58993d26369bab5731aa7c906501a364d
-
SSDEEP
24576:pQibYY78wW8JOrvATWW85EcdEz++cOciQtvlm/3L7zq1P/XooNQ+HOXhB:GwYYAwWb6l82Oqqvlm/PO1nbNnOX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1648 1956 rundll32.exe 28 PID 1956 wrote to memory of 1648 1956 rundll32.exe 28 PID 1956 wrote to memory of 1648 1956 rundll32.exe 28 PID 1956 wrote to memory of 1648 1956 rundll32.exe 28 PID 1956 wrote to memory of 1648 1956 rundll32.exe 28 PID 1956 wrote to memory of 1648 1956 rundll32.exe 28 PID 1956 wrote to memory of 1648 1956 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bdc63acbbdc6f332d710327cae95825e517e5023c8c3d708433d4adbd905565.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bdc63acbbdc6f332d710327cae95825e517e5023c8c3d708433d4adbd905565.dll,#12⤵PID:1648
-