Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
4c50d25c5cad225c4052cb21a3d98e651b20811c098e557359f8fdb30a766c65.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c50d25c5cad225c4052cb21a3d98e651b20811c098e557359f8fdb30a766c65.dll
Resource
win10v2004-20240426-en
General
-
Target
4c50d25c5cad225c4052cb21a3d98e651b20811c098e557359f8fdb30a766c65.dll
-
Size
81KB
-
MD5
89d532c68c7580c598e24fe2ba8e5e4f
-
SHA1
6179c85711ca0a7d6f6d67f5980a891ab5493ead
-
SHA256
4c50d25c5cad225c4052cb21a3d98e651b20811c098e557359f8fdb30a766c65
-
SHA512
38c98b74bf7e04c44c8a5899e5a9467b520b467c24c90100be3840e7b86bc0fe1be4b5782ab7675713d28d43357bc9fd167cca11b55c53a3a648a86221e981af
-
SSDEEP
1536:YtByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8WB:Y4v4JKXTx71w0ArSsXF3enq8WB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2040 2180 rundll32.exe 28 PID 2180 wrote to memory of 2040 2180 rundll32.exe 28 PID 2180 wrote to memory of 2040 2180 rundll32.exe 28 PID 2180 wrote to memory of 2040 2180 rundll32.exe 28 PID 2180 wrote to memory of 2040 2180 rundll32.exe 28 PID 2180 wrote to memory of 2040 2180 rundll32.exe 28 PID 2180 wrote to memory of 2040 2180 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c50d25c5cad225c4052cb21a3d98e651b20811c098e557359f8fdb30a766c65.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c50d25c5cad225c4052cb21a3d98e651b20811c098e557359f8fdb30a766c65.dll,#12⤵PID:2040
-