Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
59e7595049c655b8ec31b6b7c4ae9fcab3b63fdaa402595a5293d2b549b031f8.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
59e7595049c655b8ec31b6b7c4ae9fcab3b63fdaa402595a5293d2b549b031f8.dll
Resource
win10v2004-20240426-en
General
-
Target
59e7595049c655b8ec31b6b7c4ae9fcab3b63fdaa402595a5293d2b549b031f8.dll
-
Size
8KB
-
MD5
f0a6b858e457d67c77889834bb655948
-
SHA1
19af4fe16cc23a8f3cfc08e493454bbf3c1af5e3
-
SHA256
59e7595049c655b8ec31b6b7c4ae9fcab3b63fdaa402595a5293d2b549b031f8
-
SHA512
e3bf170a2afa813fe6a2a24b48160b88056c4b0c9ff7a74cce118c8b89add2c47a2dd09867d33c10fa71b3017be9281f52016715a89755aa131b8aa63832e5ba
-
SSDEEP
192:3LFXpIUK5qKA2wOtN6KcVYwjcUFfxJl6AkJr4RFgcHtB:3XIUvKA27CKcVY2F5SvJrFcH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 2900 2660 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59e7595049c655b8ec31b6b7c4ae9fcab3b63fdaa402595a5293d2b549b031f8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59e7595049c655b8ec31b6b7c4ae9fcab3b63fdaa402595a5293d2b549b031f8.dll,#12⤵PID:2900