Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
ddd87658782244dec43b9e9fca693d4c0976496a6a8887f7f0c9f6e3516fda0f.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ddd87658782244dec43b9e9fca693d4c0976496a6a8887f7f0c9f6e3516fda0f.dll
Resource
win10v2004-20240426-en
General
-
Target
ddd87658782244dec43b9e9fca693d4c0976496a6a8887f7f0c9f6e3516fda0f.dll
-
Size
25KB
-
MD5
39924d7821cc67b6f271b4f528ec0081
-
SHA1
0a5049b966908f164a7ddbffa55fdadab4541b39
-
SHA256
ddd87658782244dec43b9e9fca693d4c0976496a6a8887f7f0c9f6e3516fda0f
-
SHA512
c87cd842d35db62177d5b7c6612d0ffd3d465ae23c93435d3e09df7babf4a9bb109e6a67602b11ecbc83363f897d3d221f62f78e1ea5b61d77d59c773ede681e
-
SSDEEP
384:Y5ot8iGdom6BmSYFznnQQxweIPZUS+2W0ZYuSQQAMyBAUA5wgQFRqwUEfcfe6rom:6risCpYlvVWZ1YuRQQ5xAREUvtf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2588 2036 rundll32.exe 28 PID 2036 wrote to memory of 2588 2036 rundll32.exe 28 PID 2036 wrote to memory of 2588 2036 rundll32.exe 28 PID 2036 wrote to memory of 2588 2036 rundll32.exe 28 PID 2036 wrote to memory of 2588 2036 rundll32.exe 28 PID 2036 wrote to memory of 2588 2036 rundll32.exe 28 PID 2036 wrote to memory of 2588 2036 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddd87658782244dec43b9e9fca693d4c0976496a6a8887f7f0c9f6e3516fda0f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddd87658782244dec43b9e9fca693d4c0976496a6a8887f7f0c9f6e3516fda0f.dll,#12⤵PID:2588
-