Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
777c869fe42050bbdb6f8553a34e1b226a1c6c795a2c68d21a3ec42dda763ecc.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
777c869fe42050bbdb6f8553a34e1b226a1c6c795a2c68d21a3ec42dda763ecc.dll
Resource
win10v2004-20240508-en
General
-
Target
777c869fe42050bbdb6f8553a34e1b226a1c6c795a2c68d21a3ec42dda763ecc.dll
-
Size
79KB
-
MD5
4aaa439057c3988725e29938e973bb10
-
SHA1
c678e4e3087f5bf63dba2ba6c877121d71c2a81b
-
SHA256
777c869fe42050bbdb6f8553a34e1b226a1c6c795a2c68d21a3ec42dda763ecc
-
SHA512
4d3b612c85e7660261692221cbb82aff716ec00aee19979de9df361ca539d8f4795bbc0152cefa6233accbab2c4da82e2c94eac2a1f498df0c7b458763f7d7a5
-
SSDEEP
1536:BRJ7zXwN1qfBm783YUcqhd/vaTHnPBukHv7SUasWlcdG+WQ4hJJdn:BRJfnZm783Ywd/vUZ7tXG+WQUJJd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2128 1660 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\777c869fe42050bbdb6f8553a34e1b226a1c6c795a2c68d21a3ec42dda763ecc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\777c869fe42050bbdb6f8553a34e1b226a1c6c795a2c68d21a3ec42dda763ecc.dll,#12⤵PID:2128
-