Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
84e2b7806bdc8f22e22be2c562040e727748b82e3a44abfa41dec4cc13fae7de.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
84e2b7806bdc8f22e22be2c562040e727748b82e3a44abfa41dec4cc13fae7de.dll
Resource
win10v2004-20240226-en
General
-
Target
84e2b7806bdc8f22e22be2c562040e727748b82e3a44abfa41dec4cc13fae7de.dll
-
Size
2.9MB
-
MD5
d7097a257ea21cbce31f7cfc17550b01
-
SHA1
d44a053481ddaa0f71f651def9530180568ab674
-
SHA256
84e2b7806bdc8f22e22be2c562040e727748b82e3a44abfa41dec4cc13fae7de
-
SHA512
aae8b15eb202f4284bd269685ffa2684d8779b0be89e0c3b341dfabeeb32c4c793c541345a67240263146ae9380f74ca0ff0c32c1ca41df82d271f309fbb727b
-
SSDEEP
49152:qNEazLA7o71WdUNgQP2xS4/uwSjPuA0DKTsFHP0:qNEazsX+e/J5S7uAOY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2044 2180 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84e2b7806bdc8f22e22be2c562040e727748b82e3a44abfa41dec4cc13fae7de.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84e2b7806bdc8f22e22be2c562040e727748b82e3a44abfa41dec4cc13fae7de.dll,#12⤵PID:2044