Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 15:07
Behavioral task
behavioral1
Sample
7d7f9b728ce3e7593369e1a5915426a24d9c7c2e8243f8abefa76ba33a644235.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7d7f9b728ce3e7593369e1a5915426a24d9c7c2e8243f8abefa76ba33a644235.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7d7f9b728ce3e7593369e1a5915426a24d9c7c2e8243f8abefa76ba33a644235.dll
-
Size
899KB
-
MD5
753cd1ad96abaf9c722facbe57e2d068
-
SHA1
27817fb22158a255a7cf2b3ff7e5b0975d5ad334
-
SHA256
7d7f9b728ce3e7593369e1a5915426a24d9c7c2e8243f8abefa76ba33a644235
-
SHA512
f1ebbc19b12078285f522c0b1a81b0de967c79ab08e7f498cc4e29f8f06243010dae0369913242354400acf108a0eb8db8d6a85cc3414a1378ac3baeffd0faef
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXQ:7wqd87VQ
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2052 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2052 2344 rundll32.exe 28 PID 2344 wrote to memory of 2052 2344 rundll32.exe 28 PID 2344 wrote to memory of 2052 2344 rundll32.exe 28 PID 2344 wrote to memory of 2052 2344 rundll32.exe 28 PID 2344 wrote to memory of 2052 2344 rundll32.exe 28 PID 2344 wrote to memory of 2052 2344 rundll32.exe 28 PID 2344 wrote to memory of 2052 2344 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d7f9b728ce3e7593369e1a5915426a24d9c7c2e8243f8abefa76ba33a644235.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d7f9b728ce3e7593369e1a5915426a24d9c7c2e8243f8abefa76ba33a644235.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2052
-