Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
1e5ab7152d07c40c77f743645fa459c5a7dca2d95556df341d8dfe194c48e4ad.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1e5ab7152d07c40c77f743645fa459c5a7dca2d95556df341d8dfe194c48e4ad.dll
Resource
win10v2004-20240426-en
General
-
Target
1e5ab7152d07c40c77f743645fa459c5a7dca2d95556df341d8dfe194c48e4ad.dll
-
Size
376KB
-
MD5
80a161b167bceda19ac2cfd3512853ad
-
SHA1
c3ee7d2821f15b248abb3a203bf09effeb94f715
-
SHA256
1e5ab7152d07c40c77f743645fa459c5a7dca2d95556df341d8dfe194c48e4ad
-
SHA512
9667140ca9c1a8dd01185f8dc2a5af59653b8d3a383adb5b60b58a710bbc651ef710445e31739a574566a70d9679c29ff73ab66779b1cf577659914e96db1bd2
-
SSDEEP
1536:USnK4UoJmJ+Pc5u7qRYSYn703L18CvqtoOBbPSHaWLxU05:DK4UmS5u7IYC3VS66rQaWLx5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2460 2324 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e5ab7152d07c40c77f743645fa459c5a7dca2d95556df341d8dfe194c48e4ad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e5ab7152d07c40c77f743645fa459c5a7dca2d95556df341d8dfe194c48e4ad.dll,#12⤵PID:2460
-