Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 22:40
Behavioral task
behavioral1
Sample
a68324f959bcfc34c187f1a2d0b9d4ba15903e00dc0ed97e9612c6f1317927cc.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a68324f959bcfc34c187f1a2d0b9d4ba15903e00dc0ed97e9612c6f1317927cc.dll
Resource
win10v2004-20240508-en
General
-
Target
a68324f959bcfc34c187f1a2d0b9d4ba15903e00dc0ed97e9612c6f1317927cc.dll
-
Size
928KB
-
MD5
5f8d25c0aff12943aa36268c0ee72cd6
-
SHA1
ed31fdb260e35da8a27448f2fdc559b80b830254
-
SHA256
a68324f959bcfc34c187f1a2d0b9d4ba15903e00dc0ed97e9612c6f1317927cc
-
SHA512
30353d90dc2498000555b99b8c182308d60fa43c38f97519a0749d25bb86e7c3899977c4e68de06476f74ea6f39a4a1092a51696a9e33381f8ed23aa02a304a8
-
SSDEEP
24576:4pawO164HUj9kwyQeGs/bDp7avtTcfR/36cwgZ8inu92BhbSSIQwWj94HUhNhknM:4dO164HUj9kwyQet/bYqfR/36cg35n
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2928-0-0x0000000000180000-0x000000000018B000-memory.dmp upx behavioral1/memory/2928-1-0x0000000000180000-0x000000000018B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2928 2908 rundll32.exe 28 PID 2908 wrote to memory of 2928 2908 rundll32.exe 28 PID 2908 wrote to memory of 2928 2908 rundll32.exe 28 PID 2908 wrote to memory of 2928 2908 rundll32.exe 28 PID 2908 wrote to memory of 2928 2908 rundll32.exe 28 PID 2908 wrote to memory of 2928 2908 rundll32.exe 28 PID 2908 wrote to memory of 2928 2908 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a68324f959bcfc34c187f1a2d0b9d4ba15903e00dc0ed97e9612c6f1317927cc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a68324f959bcfc34c187f1a2d0b9d4ba15903e00dc0ed97e9612c6f1317927cc.dll,#12⤵PID:2928
-