Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll
Resource
win10v2004-20240426-en
General
-
Target
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll
-
Size
163KB
-
MD5
4dff2708c55e5fc5189fe0000367d62e
-
SHA1
79dfbac958791ec387a6d7dc68dbdb4143b5199c
-
SHA256
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7
-
SHA512
15f8a84c9e21ba3eb831b9797165a5f5f3ab732941e308cc8a5a605f85f3c4a63f202d8b9709b035982b141a141ea2bedf13793cef25d3810dfd8059213e7208
-
SSDEEP
3072:rZS7XF1F6Jn0hxpC6X6DgOU3Lwym1LsXapzTXsg:rZShjEn0TDX63Swb1LsyzT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2272 1624 rundll32.exe 28 PID 1624 wrote to memory of 2272 1624 rundll32.exe 28 PID 1624 wrote to memory of 2272 1624 rundll32.exe 28 PID 1624 wrote to memory of 2272 1624 rundll32.exe 28 PID 1624 wrote to memory of 2272 1624 rundll32.exe 28 PID 1624 wrote to memory of 2272 1624 rundll32.exe 28 PID 1624 wrote to memory of 2272 1624 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll,#12⤵PID:2272
-