Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
63d72d46742e81a97667d0e3db18c9bddded5a2168a180085f9f6863416915ee.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63d72d46742e81a97667d0e3db18c9bddded5a2168a180085f9f6863416915ee.dll
Resource
win10v2004-20240508-en
General
-
Target
63d72d46742e81a97667d0e3db18c9bddded5a2168a180085f9f6863416915ee.dll
-
Size
216KB
-
MD5
70b1b5e3cbbd5fa19817937f8bbe56bb
-
SHA1
84f3698af7a44d0206241d82b1362cdede0270b7
-
SHA256
63d72d46742e81a97667d0e3db18c9bddded5a2168a180085f9f6863416915ee
-
SHA512
659a91b517d5892d054b7edc7fd793bac25ed4f99bf950e2f114e903e8f89a2ad2e6028d8a8b013f3b5ecf508498ac2cacc6846f7552dceb1ed50f1ee93c3b62
-
SSDEEP
6144:vez67A4Hn6F0W02P8/+tbuHwYaaQozqc6VOOV2J2j3SIrVLLB/AOtbGL:vecn6F0W02P8/+tbuHwYaaQozqcUOOVe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1448 3056 rundll32.exe 28 PID 3056 wrote to memory of 1448 3056 rundll32.exe 28 PID 3056 wrote to memory of 1448 3056 rundll32.exe 28 PID 3056 wrote to memory of 1448 3056 rundll32.exe 28 PID 3056 wrote to memory of 1448 3056 rundll32.exe 28 PID 3056 wrote to memory of 1448 3056 rundll32.exe 28 PID 3056 wrote to memory of 1448 3056 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63d72d46742e81a97667d0e3db18c9bddded5a2168a180085f9f6863416915ee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63d72d46742e81a97667d0e3db18c9bddded5a2168a180085f9f6863416915ee.dll,#12⤵PID:1448
-