Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll
Resource
win10v2004-20240426-en
General
-
Target
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll
-
Size
4.7MB
-
MD5
f8fe01a9ea11c9752b50afd4d3f80717
-
SHA1
9e67c6e0fd86e6f0cc0170e47b52ebfa04957c98
-
SHA256
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b
-
SHA512
f8c0c348142224e2dc339bce5f283642516bd5e068be4b97fd3eca5fcaa81914e539644d04763216323e3ae97c4c603257fc5fab6bea081dc66a8fa79a18224a
-
SSDEEP
98304:V06qoT/AuwfHQL3H2m/ltB0+KwZ4kTMeKkYm:C6qG/AuWQL3T/ltB0+KwZ4kTMe+m
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2300 2220 rundll32.exe 28 PID 2220 wrote to memory of 2300 2220 rundll32.exe 28 PID 2220 wrote to memory of 2300 2220 rundll32.exe 28 PID 2220 wrote to memory of 2300 2220 rundll32.exe 28 PID 2220 wrote to memory of 2300 2220 rundll32.exe 28 PID 2220 wrote to memory of 2300 2220 rundll32.exe 28 PID 2220 wrote to memory of 2300 2220 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll,#12⤵PID:2300
-