Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:34
Static task
static1
Behavioral task
behavioral1
Sample
7e20db85c0d05657f0bd26ae97965d67b5fe3d4325441692dd0b00e52b14b87f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e20db85c0d05657f0bd26ae97965d67b5fe3d4325441692dd0b00e52b14b87f.dll
Resource
win10v2004-20240426-en
General
-
Target
7e20db85c0d05657f0bd26ae97965d67b5fe3d4325441692dd0b00e52b14b87f.dll
-
Size
317KB
-
MD5
18d463cff31510bd6c1c6ac7b9e19f92
-
SHA1
3efd50abafdc638eb6ef95abe09d2354c7a734fd
-
SHA256
7e20db85c0d05657f0bd26ae97965d67b5fe3d4325441692dd0b00e52b14b87f
-
SHA512
6831e786889961b79b56a5d8cda71dacba96c2ad5f8f32ecb85c2223b87f571a2381bfffbf45cfb45db1503548dfd9a14d30e687b9c60e1a097e8afd024808c7
-
SSDEEP
6144:zmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw4f3z:zmWQa0a1IMVr9eMqbRzLuVucfb8ehbjH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe PID 1136 wrote to memory of 1736 1136 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e20db85c0d05657f0bd26ae97965d67b5fe3d4325441692dd0b00e52b14b87f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e20db85c0d05657f0bd26ae97965d67b5fe3d4325441692dd0b00e52b14b87f.dll,#12⤵PID:1736