Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
62684fc22836ec4cb8e1e12d4c3ed7454dd5c7b756610ecd9fae9d0165e851fc.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
62684fc22836ec4cb8e1e12d4c3ed7454dd5c7b756610ecd9fae9d0165e851fc.dll
Resource
win10v2004-20240508-en
General
-
Target
62684fc22836ec4cb8e1e12d4c3ed7454dd5c7b756610ecd9fae9d0165e851fc.dll
-
Size
424KB
-
MD5
88d5f01c223c61b8d33c916456a33650
-
SHA1
38d24400e8fdceecdfc8d49028a7b5191703c404
-
SHA256
62684fc22836ec4cb8e1e12d4c3ed7454dd5c7b756610ecd9fae9d0165e851fc
-
SHA512
bdea57e29847503a248f58f604000c88a988fadcb7baaab6040b5a18174eda105a3a3fc945ecf98a782e00fa6c3662b88a9f057970e92b0b7fcd8c2a447a334e
-
SSDEEP
6144:hzGfA7TNi73NuwFsEqWjU6HzGUtxWoYr4r+e5/qyYpWE0ao98bJ6zU6iT:sATNicEqWjU6iUtx5Yr4dtN8kzU9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 1256 2068 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62684fc22836ec4cb8e1e12d4c3ed7454dd5c7b756610ecd9fae9d0165e851fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62684fc22836ec4cb8e1e12d4c3ed7454dd5c7b756610ecd9fae9d0165e851fc.dll,#12⤵PID:1256