Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
76d37dfe26419ea5766b506bc19e9841e92484680e4c8e1c036692f56e577a43.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
76d37dfe26419ea5766b506bc19e9841e92484680e4c8e1c036692f56e577a43.dll
Resource
win10v2004-20240508-en
General
-
Target
76d37dfe26419ea5766b506bc19e9841e92484680e4c8e1c036692f56e577a43.dll
-
Size
329KB
-
MD5
3ab67c7aa6a5fd43d19b21f1a99dfd91
-
SHA1
40cb38b86af10ae24bb384ec8fa940dbf0ad952a
-
SHA256
76d37dfe26419ea5766b506bc19e9841e92484680e4c8e1c036692f56e577a43
-
SHA512
9f798a53106cf3ede39c319cd0f3569c1343772a4b1ddebf5b63a009897fc3fdb630866ccfdb11733ff2be215fb9e6380d4dffb4f1f487ddf3c1a62a77030a5d
-
SSDEEP
6144:RLmWnuNrNVUvPEmRyWHj8MVloEh5QLxCSPGIsTPNctYy6egz8zZ4SUcXgZ9oi:RLmWuNrNVUXEYDQL5JsL+2DN8F4SUy7i
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe PID 2084 wrote to memory of 2076 2084 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76d37dfe26419ea5766b506bc19e9841e92484680e4c8e1c036692f56e577a43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76d37dfe26419ea5766b506bc19e9841e92484680e4c8e1c036692f56e577a43.dll,#12⤵PID:2076