Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:19
Static task
static1
Behavioral task
behavioral1
Sample
607a21eaa5ca46fa1483e30194585cf185bf427108011a8e94921e7bdb75b9bc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
607a21eaa5ca46fa1483e30194585cf185bf427108011a8e94921e7bdb75b9bc.dll
Resource
win10v2004-20240508-en
General
-
Target
607a21eaa5ca46fa1483e30194585cf185bf427108011a8e94921e7bdb75b9bc.dll
-
Size
81KB
-
MD5
b4253227e9f495a3574fe248860d5d70
-
SHA1
dfa60a76c71f6964b7ce409ceaca90f607fff53c
-
SHA256
607a21eaa5ca46fa1483e30194585cf185bf427108011a8e94921e7bdb75b9bc
-
SHA512
0a8fb6ecee906d81f95f9f8506689c817ede47855959fdd061f20e3b36e38f331f703c9bf8f905bb5ad120a1162728a71580631d19523b747268a5ad49f4ea23
-
SSDEEP
1536:+tByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8Ws:+4v4JKXTx71w0ArSsXF3enq8Ws
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2100 1964 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\607a21eaa5ca46fa1483e30194585cf185bf427108011a8e94921e7bdb75b9bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\607a21eaa5ca46fa1483e30194585cf185bf427108011a8e94921e7bdb75b9bc.dll,#12⤵PID:2100