Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
9a7c580ca0b9d623df7627ae8844525793f8aa235f7114af455214a7d2d3a469.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a7c580ca0b9d623df7627ae8844525793f8aa235f7114af455214a7d2d3a469.dll
Resource
win10v2004-20240419-en
General
-
Target
9a7c580ca0b9d623df7627ae8844525793f8aa235f7114af455214a7d2d3a469.dll
-
Size
6KB
-
MD5
c49fcdcfaadbcc40bb1c5d1ff50d604f
-
SHA1
6b6e4ca6571c5288e7e2bf71e41cd20e34a5d4c8
-
SHA256
9a7c580ca0b9d623df7627ae8844525793f8aa235f7114af455214a7d2d3a469
-
SHA512
25417b925452cb6bbc1d6449f825e908c8cad6253e99a4d7245399e4c5fc6a66663dfc8ae1158b52817e6349c3bc3cdb52a23ccc62cb9ea1091c670364c0314c
-
SSDEEP
192:F5oLVuqUbgTGWQ+z2D/p4Xz70cAEp/4w:F5mVuqU8yWQ+zq/p4Xz70cAEp/4w
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a7c580ca0b9d623df7627ae8844525793f8aa235f7114af455214a7d2d3a469.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a7c580ca0b9d623df7627ae8844525793f8aa235f7114af455214a7d2d3a469.dll,#12⤵PID:2212
-