Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll
Resource
win10v2004-20240508-en
General
-
Target
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll
-
Size
317KB
-
MD5
58138fc980b00369dd0eb88d7e15524d
-
SHA1
69e285b8a85ffd45a84b33da8f7e2acfaa24206c
-
SHA256
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1
-
SHA512
a1757b99c81e1473c92a2df3d768f0cc2fa04c22fde42cb47feacb954be57386796a91c74c16b490c2b0c5de834311ffd8296ff26c9bc51a1a4a57aee7546e6b
-
SSDEEP
6144:zmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw4f3E:zmWQa0a1IMVr9eMqbRzLuVucfb8ehbjH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 1044 2264 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll,#12⤵PID:1044