Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
a33525390d04bf0368e279fc42e871475be07488e1394a06b9f2784e10f3ab3c.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a33525390d04bf0368e279fc42e871475be07488e1394a06b9f2784e10f3ab3c.dll
Resource
win10v2004-20240508-en
General
-
Target
a33525390d04bf0368e279fc42e871475be07488e1394a06b9f2784e10f3ab3c.dll
-
Size
329KB
-
MD5
1aca82f8bd31834702c0dddf9824c57c
-
SHA1
77c9a36fb73b21ed0a0b2480664eb8ceb426920c
-
SHA256
a33525390d04bf0368e279fc42e871475be07488e1394a06b9f2784e10f3ab3c
-
SHA512
a616f576ee95e781561683c7e48819c7aa5cdf8f6297cddf827544634855ce3d441e9fd6e3576fc70968e4db74461610b0aaa7a4ff09c55170bb2f0888733639
-
SSDEEP
6144:RmWhxR1arY/PbgmFOabPIIBhJXAv7eTY9suz0xhttGSrDKE3KIvSka8bN:RmWTR1arYnEKosuzY34CZ3DvSkN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 2180 1548 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a33525390d04bf0368e279fc42e871475be07488e1394a06b9f2784e10f3ab3c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a33525390d04bf0368e279fc42e871475be07488e1394a06b9f2784e10f3ab3c.dll,#12⤵PID:2180