Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
92f7c3527f1e671d7c16adaf901e90409597a0c1db797f8bef1fa5f123a2822f.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
92f7c3527f1e671d7c16adaf901e90409597a0c1db797f8bef1fa5f123a2822f.dll
Resource
win10v2004-20240426-en
General
-
Target
92f7c3527f1e671d7c16adaf901e90409597a0c1db797f8bef1fa5f123a2822f.dll
-
Size
52KB
-
MD5
2264a51ed408ce2af804f2b1a82afc69
-
SHA1
c333ef009af96389e72619362ab4459131ee5080
-
SHA256
92f7c3527f1e671d7c16adaf901e90409597a0c1db797f8bef1fa5f123a2822f
-
SHA512
a4b21c8d2ec1af254e9a9ead00188a816d7f045d0a8aad7d3d5a936ab27a90296b5fc3ff2039c4331bc2af43f3efbbe9a338642c2f2414db753c276f4c20580c
-
SSDEEP
768:9IZVh6qdYKcUmUolM64DtNWm9EEiUh1NQCCyEhuubOLt:67h6IYVl9O0m1N8MubOL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1012 1900 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92f7c3527f1e671d7c16adaf901e90409597a0c1db797f8bef1fa5f123a2822f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92f7c3527f1e671d7c16adaf901e90409597a0c1db797f8bef1fa5f123a2822f.dll,#12⤵PID:1012