Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
5ee0ee1b74d1139a6d258bc86f42dcc460dea2e51b2892ffe762825e842b07ff.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5ee0ee1b74d1139a6d258bc86f42dcc460dea2e51b2892ffe762825e842b07ff.dll
Resource
win10v2004-20240426-en
General
-
Target
5ee0ee1b74d1139a6d258bc86f42dcc460dea2e51b2892ffe762825e842b07ff.dll
-
Size
327KB
-
MD5
114a8a25e4081eab6e2af6cd71682337
-
SHA1
aeb903e38040549587affa5c6f01a4afb78a6096
-
SHA256
5ee0ee1b74d1139a6d258bc86f42dcc460dea2e51b2892ffe762825e842b07ff
-
SHA512
6a1288da50d8460af538010b3bbd773fd352b8e716d947d2a49e889f1f518db735f30ce94e53e4cd560e0d4ca4b131a8f80c65e277a885f9950f2918f42e4c11
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe PID 2064 wrote to memory of 1932 2064 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ee0ee1b74d1139a6d258bc86f42dcc460dea2e51b2892ffe762825e842b07ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ee0ee1b74d1139a6d258bc86f42dcc460dea2e51b2892ffe762825e842b07ff.dll,#12⤵PID:1932
-