Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 01:32
Behavioral task
behavioral1
Sample
c16924c05f021f20b875cf5ead697d1d35cd0628e2609d751c607738676b2db7.dll
Resource
win7-20240419-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c16924c05f021f20b875cf5ead697d1d35cd0628e2609d751c607738676b2db7.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
c16924c05f021f20b875cf5ead697d1d35cd0628e2609d751c607738676b2db7.dll
-
Size
660KB
-
MD5
0de89510dd6fd47f99343513afab8aaf
-
SHA1
f7d91dc72230bb7dd9ad70e5b40cee5c11cf2d18
-
SHA256
c16924c05f021f20b875cf5ead697d1d35cd0628e2609d751c607738676b2db7
-
SHA512
d46dad61212e0b370bccdaf1f996b4dcc0c802e8df2c3bc8d7642c6af3e76061fd5f1fba86c8c4a5a4fcc09da83159c1b37d9973132e6a1a1d311258fce2f46a
-
SSDEEP
12288:wtlp0ywgatUAD9EREYvZIk1OZ26R3pkz+TrJ3Mm:wtz0SatUAD9E+YvZIkAZ26xpkzgC
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2052 2288 rundll32.exe 28 PID 2288 wrote to memory of 2052 2288 rundll32.exe 28 PID 2288 wrote to memory of 2052 2288 rundll32.exe 28 PID 2288 wrote to memory of 2052 2288 rundll32.exe 28 PID 2288 wrote to memory of 2052 2288 rundll32.exe 28 PID 2288 wrote to memory of 2052 2288 rundll32.exe 28 PID 2288 wrote to memory of 2052 2288 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c16924c05f021f20b875cf5ead697d1d35cd0628e2609d751c607738676b2db7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c16924c05f021f20b875cf5ead697d1d35cd0628e2609d751c607738676b2db7.dll,#12⤵PID:2052
-