Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
a1b9de02fca3d9915acb1d76adefd87affdf1829023f2a19d880b7dc72e4c7e7.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1b9de02fca3d9915acb1d76adefd87affdf1829023f2a19d880b7dc72e4c7e7.dll
Resource
win10v2004-20240426-en
General
-
Target
a1b9de02fca3d9915acb1d76adefd87affdf1829023f2a19d880b7dc72e4c7e7.dll
-
Size
81KB
-
MD5
1a6c6f7ff16542ae06431d43df2f4670
-
SHA1
51b2d2bed9c1a0964bd13f35a17cf1156bc85f8c
-
SHA256
a1b9de02fca3d9915acb1d76adefd87affdf1829023f2a19d880b7dc72e4c7e7
-
SHA512
b7fde563c9f7f04ceb8425af1ce0a06b8ce3f063b5091e633f834652e6235f708b49772563162eb4a5c095a97e89384e1a139dfc0aa7c35e735e9ad65293ca3a
-
SSDEEP
1536:XtByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8Wl:X4v4JKXTx71w0ArSsXF3enq8Wl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2848 1668 rundll32.exe 28 PID 1668 wrote to memory of 2848 1668 rundll32.exe 28 PID 1668 wrote to memory of 2848 1668 rundll32.exe 28 PID 1668 wrote to memory of 2848 1668 rundll32.exe 28 PID 1668 wrote to memory of 2848 1668 rundll32.exe 28 PID 1668 wrote to memory of 2848 1668 rundll32.exe 28 PID 1668 wrote to memory of 2848 1668 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1b9de02fca3d9915acb1d76adefd87affdf1829023f2a19d880b7dc72e4c7e7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1b9de02fca3d9915acb1d76adefd87affdf1829023f2a19d880b7dc72e4c7e7.dll,#12⤵PID:2848
-