Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
0f0a9c7626f90565c78d3b8be038f1e0c9a5d028ea1007c555042a9d25a004f7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f0a9c7626f90565c78d3b8be038f1e0c9a5d028ea1007c555042a9d25a004f7.dll
Resource
win10v2004-20240508-en
General
-
Target
0f0a9c7626f90565c78d3b8be038f1e0c9a5d028ea1007c555042a9d25a004f7.dll
-
Size
92KB
-
MD5
dac78e40ed7bf176cac97a0df64a0e07
-
SHA1
f74ad1e6a8c9fe518c8b1ff318995babd6bb7b72
-
SHA256
0f0a9c7626f90565c78d3b8be038f1e0c9a5d028ea1007c555042a9d25a004f7
-
SHA512
8fe54e429117bce43d249f04f195ceefd4b04d7a49fb6091bf1a900ae9177459163586ffe42db23617e196b739943b292e7f717b54c4ac178872e35f97b3f5d4
-
SSDEEP
1536:mWMB+jKsbRcJwMC7uACtMH+CWoa7GN36IsW8KcdG6+E9obWAyNZTSO:mWHK9mMCsMHkGZMLG0MWzfTSO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1196 2020 rundll32.exe 28 PID 2020 wrote to memory of 1196 2020 rundll32.exe 28 PID 2020 wrote to memory of 1196 2020 rundll32.exe 28 PID 2020 wrote to memory of 1196 2020 rundll32.exe 28 PID 2020 wrote to memory of 1196 2020 rundll32.exe 28 PID 2020 wrote to memory of 1196 2020 rundll32.exe 28 PID 2020 wrote to memory of 1196 2020 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f0a9c7626f90565c78d3b8be038f1e0c9a5d028ea1007c555042a9d25a004f7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f0a9c7626f90565c78d3b8be038f1e0c9a5d028ea1007c555042a9d25a004f7.dll,#12⤵PID:1196
-