Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
92b272c8d70cb1463862bb8e2549cd0ea3cab134df4a80f0f094258e0892dc84.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92b272c8d70cb1463862bb8e2549cd0ea3cab134df4a80f0f094258e0892dc84.dll
Resource
win10v2004-20240508-en
General
-
Target
92b272c8d70cb1463862bb8e2549cd0ea3cab134df4a80f0f094258e0892dc84.dll
-
Size
329KB
-
MD5
57ab0a5651b4be85349ab1b20a1ba5b6
-
SHA1
e0c2bd3808a9beaa0fdf07f564840385aaf24e4e
-
SHA256
92b272c8d70cb1463862bb8e2549cd0ea3cab134df4a80f0f094258e0892dc84
-
SHA512
5cb399961b4fe8d98d56f901eb987e0902a8d6566b824ecee9393376c8e42241840a31b388a11af97269b3991cdf46be1482e72a1e7549fcb0a9f833038eb672
-
SSDEEP
6144:RLmWnuNrNVUvPEmRyWHj8MVloEh5QLxCSPGIsTPNctYy6egz8zZ4SUcXgZFoi:RLmWuNrNVUXEYDQL5JsL+2DN8F4SUyHi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92b272c8d70cb1463862bb8e2549cd0ea3cab134df4a80f0f094258e0892dc84.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92b272c8d70cb1463862bb8e2549cd0ea3cab134df4a80f0f094258e0892dc84.dll,#12⤵PID:1744