Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
8d549b13edf2b0738f2d810deea667e23a4a0e55260436b74e3e6723d2ae2317.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d549b13edf2b0738f2d810deea667e23a4a0e55260436b74e3e6723d2ae2317.dll
Resource
win10v2004-20240508-en
General
-
Target
8d549b13edf2b0738f2d810deea667e23a4a0e55260436b74e3e6723d2ae2317.dll
-
Size
56KB
-
MD5
4a3b17209b0d42cba61363a00ba19f75
-
SHA1
1618a9f7ab839478f39f8ee3f0424396aef17f31
-
SHA256
8d549b13edf2b0738f2d810deea667e23a4a0e55260436b74e3e6723d2ae2317
-
SHA512
be258ad401712cd67b7f99d1c37232463886a90bd6a2b3d629f98c9158618e3538163e227953704d9e247263afed04be4285f13cca1d3f1c8cb5a482ae7a325f
-
SSDEEP
768:RQqXPHurp6hmY27ZbLPNmPJdmvDDDDDDDDDDDDDDDlGBn9w48Ekg55sztXy66U1r:Dap6QxvmhdmRGU48E12Ny631B7J5V
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1252 1700 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d549b13edf2b0738f2d810deea667e23a4a0e55260436b74e3e6723d2ae2317.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d549b13edf2b0738f2d810deea667e23a4a0e55260436b74e3e6723d2ae2317.dll,#12⤵PID:1252