Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
855f63830d14c8e6a57d77b21c4563e7366fbeb0536cc8c0ef60b65eebe55f37.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
855f63830d14c8e6a57d77b21c4563e7366fbeb0536cc8c0ef60b65eebe55f37.dll
Resource
win10v2004-20240508-en
General
-
Target
855f63830d14c8e6a57d77b21c4563e7366fbeb0536cc8c0ef60b65eebe55f37.dll
-
Size
5KB
-
MD5
d88570bbf4023a034820c37b8e520835
-
SHA1
19ab30382069b80e6df40285ddce7ef43073742b
-
SHA256
855f63830d14c8e6a57d77b21c4563e7366fbeb0536cc8c0ef60b65eebe55f37
-
SHA512
b7c0c558da498070ba6d50822f8969685850bafe4f6e6ad9a66da1ec07d0be6651215a6a3c128bc4f66e00d8619f0114d2ae3456f005d032d600cf0890838cd6
-
SSDEEP
96:hy859x0P8MaWhBX9u5SIRzEYRishUwAKXJkjCHitBS:F5oLZr90TRishjJkjzrS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 340 2040 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\855f63830d14c8e6a57d77b21c4563e7366fbeb0536cc8c0ef60b65eebe55f37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\855f63830d14c8e6a57d77b21c4563e7366fbeb0536cc8c0ef60b65eebe55f37.dll,#12⤵PID:340