Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 09:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
plaguepast hackvshack.net.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
plaguepast hackvshack.net.dll
Resource
win10v2004-20240419-en
1 signatures
150 seconds
General
-
Target
plaguepast hackvshack.net.dll
-
Size
9.1MB
-
MD5
d58c63a30e0c82dcdf83e5ec983289cd
-
SHA1
75c7240e060667d674fab2c8117dc3a52909c3d2
-
SHA256
cc5355f2d34911a2bc141dee33a792c4a36daa151c808352a32b956cdf5932ce
-
SHA512
7cbf60648c047bc8db2c1430bb835b28097c8a329f4c8de1e077f54f5ce7b76492c1d5ab1de23802583edc0da435c05f6b577f39642cd59220f5e394a92256ea
-
SSDEEP
98304:LMRV0HXaBLYm40XcyOQFgu6Q3lZ8TRbp/sbe3aNr:LMneXahJsyzx6WZQzKe
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 912 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 912 wrote to memory of 2088 912 rundll32.exe 28 PID 912 wrote to memory of 2088 912 rundll32.exe 28 PID 912 wrote to memory of 2088 912 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\plaguepast hackvshack.net.dll",#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 912 -s 2162⤵PID:2088
-