Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll
Resource
win10v2004-20240426-en
General
-
Target
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll
-
Size
163KB
-
MD5
4dff2708c55e5fc5189fe0000367d62e
-
SHA1
79dfbac958791ec387a6d7dc68dbdb4143b5199c
-
SHA256
56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7
-
SHA512
15f8a84c9e21ba3eb831b9797165a5f5f3ab732941e308cc8a5a605f85f3c4a63f202d8b9709b035982b141a141ea2bedf13793cef25d3810dfd8059213e7208
-
SSDEEP
3072:rZS7XF1F6Jn0hxpC6X6DgOU3Lwym1LsXapzTXsg:rZShjEn0TDX63Swb1LsyzT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 2272 1624 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56e7a276e76f11ba1a5042a67376184d476e939de78e641c902672bb0bf681d7.dll,#12⤵PID:2272