Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
ae5cc8c9a7bd39e1cb24d6050abe27dbe943671ddc5ed2a7c7a407f9daf1ba99.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ae5cc8c9a7bd39e1cb24d6050abe27dbe943671ddc5ed2a7c7a407f9daf1ba99.dll
Resource
win10v2004-20240426-en
General
-
Target
ae5cc8c9a7bd39e1cb24d6050abe27dbe943671ddc5ed2a7c7a407f9daf1ba99.dll
-
Size
81KB
-
MD5
db9d5503d987e5cfd04e9f82fd24332d
-
SHA1
90a9a83f3ea8a83055497f91ed8ba7f1aab124ea
-
SHA256
ae5cc8c9a7bd39e1cb24d6050abe27dbe943671ddc5ed2a7c7a407f9daf1ba99
-
SHA512
7dbfd52178f2e72a13edf378b8ddc709019d5dda639616f04da5892b71a263bbaa2b1527fbed6394e1819cdc4e39487b758a936dc50dd03d4cd2b2fab9faa3e6
-
SSDEEP
1536:VKByXv7uWGEqXZKXTadSp7Lxw9zzBPw+NASUSFOj8sWHcdF6+eXq8WC:VLv4JKXTx71wnArSsXFpeXq8WC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3024 3008 rundll32.exe 28 PID 3008 wrote to memory of 3024 3008 rundll32.exe 28 PID 3008 wrote to memory of 3024 3008 rundll32.exe 28 PID 3008 wrote to memory of 3024 3008 rundll32.exe 28 PID 3008 wrote to memory of 3024 3008 rundll32.exe 28 PID 3008 wrote to memory of 3024 3008 rundll32.exe 28 PID 3008 wrote to memory of 3024 3008 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae5cc8c9a7bd39e1cb24d6050abe27dbe943671ddc5ed2a7c7a407f9daf1ba99.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae5cc8c9a7bd39e1cb24d6050abe27dbe943671ddc5ed2a7c7a407f9daf1ba99.dll,#12⤵PID:3024
-