Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:54
Behavioral task
behavioral1
Sample
d61a5498bcbfba8c23218675519d3c4364505efd73379b9cfefd26e233d08cf7.dll
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
d61a5498bcbfba8c23218675519d3c4364505efd73379b9cfefd26e233d08cf7.dll
-
Size
127KB
-
MD5
0fac6e382f5c2b45a6c95c3a040082f3
-
SHA1
fab81e7d570c254098594e1b0b80f70fabf662d3
-
SHA256
d61a5498bcbfba8c23218675519d3c4364505efd73379b9cfefd26e233d08cf7
-
SHA512
91a4aa347fbbb7ad1a3d60fad749b1d32e582d47a7f67b9b1f4e0346199da959221f4c8f3ede9ec0fc5d60199107ea1bccd8e6f5d8e0f9c8e45b9f3d5cee60cf
-
SSDEEP
3072:OMbIWiyr7pjvThoBFEbWwIUJlTBft3+++N:OCIWiyr7J2n16lTBl3++
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nbqdjdyf.exe rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2648 1612 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d61a5498bcbfba8c23218675519d3c4364505efd73379b9cfefd26e233d08cf7.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d61a5498bcbfba8c23218675519d3c4364505efd73379b9cfefd26e233d08cf7.dll,#12⤵
- Drops startup file