Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
f5c2db050b2cc22a162dd717a1d4d8eeb16d3396f1b30f05d2f9784d2b76fc02.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5c2db050b2cc22a162dd717a1d4d8eeb16d3396f1b30f05d2f9784d2b76fc02.dll
Resource
win10v2004-20240419-en
General
-
Target
f5c2db050b2cc22a162dd717a1d4d8eeb16d3396f1b30f05d2f9784d2b76fc02.dll
-
Size
178KB
-
MD5
e75ab81460e4d7b8470cc7ef0291fdd3
-
SHA1
41f2487929bcaf6022a7e762601293ac4734fbf7
-
SHA256
f5c2db050b2cc22a162dd717a1d4d8eeb16d3396f1b30f05d2f9784d2b76fc02
-
SHA512
020a4f9fe4ff2d67d84d55f0c7fe1edf2d15b5e6b426a7b923dbf091513967d8b5318487fb7e3f5fb1f19cc71c0366a42fc4a1c9e10381c008f936e7bcc07174
-
SSDEEP
3072:Wm4YPRJSLqr5aA5u8fGsLNM4lNyq5sYpkxWcoT5oT/TQOtbpEGpiWXqxu:W5w4YUAuOGsvUJOoT/MOtbpEOL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2772 1772 rundll32.exe 28 PID 1772 wrote to memory of 2772 1772 rundll32.exe 28 PID 1772 wrote to memory of 2772 1772 rundll32.exe 28 PID 1772 wrote to memory of 2772 1772 rundll32.exe 28 PID 1772 wrote to memory of 2772 1772 rundll32.exe 28 PID 1772 wrote to memory of 2772 1772 rundll32.exe 28 PID 1772 wrote to memory of 2772 1772 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5c2db050b2cc22a162dd717a1d4d8eeb16d3396f1b30f05d2f9784d2b76fc02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5c2db050b2cc22a162dd717a1d4d8eeb16d3396f1b30f05d2f9784d2b76fc02.dll,#12⤵PID:2772
-