Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
8f0f486dacb0299b4ca4467528e50fc05792a5c2bd9f3898b4180874c1102701.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8f0f486dacb0299b4ca4467528e50fc05792a5c2bd9f3898b4180874c1102701.dll
Resource
win10v2004-20240226-en
General
-
Target
8f0f486dacb0299b4ca4467528e50fc05792a5c2bd9f3898b4180874c1102701.dll
-
Size
81KB
-
MD5
54df3658f306908189895050cd53b175
-
SHA1
c2b842995f7b18a44cdd65734e9dcd8fcfb167a8
-
SHA256
8f0f486dacb0299b4ca4467528e50fc05792a5c2bd9f3898b4180874c1102701
-
SHA512
2a965f8bccf09460585c119df818439b3d295e09edd9758cd595e07afdb41a9f75fc205e6fbd1d2939044cba48b789c6ab1cecdf7746f3c84793eb6bc1a5bdaa
-
SSDEEP
1536:ktByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8Wv:k4v4JKXTx71w0ArSsXF3enq8Wv
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2100 1760 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f0f486dacb0299b4ca4467528e50fc05792a5c2bd9f3898b4180874c1102701.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f0f486dacb0299b4ca4467528e50fc05792a5c2bd9f3898b4180874c1102701.dll,#12⤵PID:2100