Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
6858cad855ee5c3c7ebe6bbe6f4b552ba328f752a61c22ebd5700bbf668cf3a5.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6858cad855ee5c3c7ebe6bbe6f4b552ba328f752a61c22ebd5700bbf668cf3a5.dll
Resource
win10v2004-20240508-en
General
-
Target
6858cad855ee5c3c7ebe6bbe6f4b552ba328f752a61c22ebd5700bbf668cf3a5.dll
-
Size
395KB
-
MD5
0c7528831ce0e260f0474694df5c4739
-
SHA1
fd245a2196441616616355e9a511341e2c45b8e0
-
SHA256
6858cad855ee5c3c7ebe6bbe6f4b552ba328f752a61c22ebd5700bbf668cf3a5
-
SHA512
a45587e05aa78c6301c568eef79ce0148c3aad26a497c7ac37de81d203b1de26fe87b4641fd4b9c5bfb615a39db9cce19f221bc30c73a99f307302561a1288c2
-
SSDEEP
6144:t++8crLxmdrnNpgmTAG7X/sJ8XuaHci8KjVf5Vncf52XVEpxzV50DEr1AO/M2q:7XeIe7X/K8XF8ach2FEXEDuNM
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2152 2300 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6858cad855ee5c3c7ebe6bbe6f4b552ba328f752a61c22ebd5700bbf668cf3a5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6858cad855ee5c3c7ebe6bbe6f4b552ba328f752a61c22ebd5700bbf668cf3a5.dll,#12⤵PID:2152