Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
9abee23390e0d353d6326b77a2dd33336013a57a7f9469a1049d005f8aa5725c.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9abee23390e0d353d6326b77a2dd33336013a57a7f9469a1049d005f8aa5725c.dll
Resource
win10v2004-20240508-en
General
-
Target
9abee23390e0d353d6326b77a2dd33336013a57a7f9469a1049d005f8aa5725c.dll
-
Size
5KB
-
MD5
e87af8a131a786e1db2619ae63775cff
-
SHA1
423f71c28393c311acfdd2961ea38cf314dfbc03
-
SHA256
9abee23390e0d353d6326b77a2dd33336013a57a7f9469a1049d005f8aa5725c
-
SHA512
5e6c9cc4e712eaa5c167ff657162580ee4fbc5b894be083954c998a288928fe3bb4f0970b9f6340ceae96bc02f0ffcbb5cfa63b239fd3706ea2b9a5ec552bdf1
-
SSDEEP
96:nEY2RrF1eqwi4eEhhvFlRpfutKbmqs9Gq:EHRh1eppfzlR0ElNq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2044 2220 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9abee23390e0d353d6326b77a2dd33336013a57a7f9469a1049d005f8aa5725c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9abee23390e0d353d6326b77a2dd33336013a57a7f9469a1049d005f8aa5725c.dll,#12⤵PID:2044