Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
3ecf43ca49c573c3919f98d8a08554fe257a0159b425d5a4afa6958c1425fd0c.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ecf43ca49c573c3919f98d8a08554fe257a0159b425d5a4afa6958c1425fd0c.dll
Resource
win10v2004-20240226-en
General
-
Target
3ecf43ca49c573c3919f98d8a08554fe257a0159b425d5a4afa6958c1425fd0c.dll
-
Size
8KB
-
MD5
988ef9381430f52d5935522e00776a6d
-
SHA1
640b6a4764be69f361964d1866ff4f93bce3cd11
-
SHA256
3ecf43ca49c573c3919f98d8a08554fe257a0159b425d5a4afa6958c1425fd0c
-
SHA512
daa6940760bc6b24fc8100c7b3e7970bc9c9cde5cd83f318b1020cdb724f8a731a14bd584bf2b65d19d17e4ced76a73407b09bb4ac8a9c016336a090d46b1317
-
SSDEEP
192:bLHBKpbUD5jKXvR8IoN6NttjL2XbRLe+Ob03z+LRq5Oj:bsbUFKXyI5PtP2XbR2b+u
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1944 1936 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ecf43ca49c573c3919f98d8a08554fe257a0159b425d5a4afa6958c1425fd0c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ecf43ca49c573c3919f98d8a08554fe257a0159b425d5a4afa6958c1425fd0c.dll,#12⤵PID:1944