Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll
Resource
win10v2004-20240508-en
General
-
Target
b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll
-
Size
82KB
-
MD5
c08f0466a6beef4dd1b65311a03c6879
-
SHA1
e2728ea6fdbd34872eff61d0844e6734773e2cfe
-
SHA256
b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1
-
SHA512
ca4e3d9cc8cda3791c31b5cd1b9a885eedded06afb16b40184386b16fd2deea979ac2eaabebf8ce80aed0faa29f6ee05104e31e4725560f9760fc94f68a8ed57
-
SSDEEP
1536:moXhEXC+6+ZRxZeeirlqQ0nca4wnZgaLktA+31+SY4sWlcdliSWk8/msahOj:mo+XVxYVJqQ0pZg6vFlrWksahOj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1624 2456 rundll32.exe 28 PID 2456 wrote to memory of 1624 2456 rundll32.exe 28 PID 2456 wrote to memory of 1624 2456 rundll32.exe 28 PID 2456 wrote to memory of 1624 2456 rundll32.exe 28 PID 2456 wrote to memory of 1624 2456 rundll32.exe 28 PID 2456 wrote to memory of 1624 2456 rundll32.exe 28 PID 2456 wrote to memory of 1624 2456 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll,#12⤵PID:1624
-