Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 05:24
Behavioral task
behavioral1
Sample
f18ec61bcd6c328fcb7e3c288c7f8f1ba69f84c643d355d40372fba6cb8bc65b.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f18ec61bcd6c328fcb7e3c288c7f8f1ba69f84c643d355d40372fba6cb8bc65b.dll
Resource
win10v2004-20240426-en
General
-
Target
f18ec61bcd6c328fcb7e3c288c7f8f1ba69f84c643d355d40372fba6cb8bc65b.dll
-
Size
204KB
-
MD5
479d7c9aae86c3382aed04aac4fdd656
-
SHA1
32a40bccd7212e17ccd6d4dcc5ec0e0d9489b81a
-
SHA256
f18ec61bcd6c328fcb7e3c288c7f8f1ba69f84c643d355d40372fba6cb8bc65b
-
SHA512
9337ba7b1c45e5a81e00e9c5b7545b381e2e9bdf9df7014281c785c90fc18e6d5b41c5d12eb2f98f997a70b43f1ac1a259081bfd440c815cc6e0d428b7b2b600
-
SSDEEP
3072:YaMXwmjoFlRV/rrgx3whtXqZiBX2u8jZcwrFPOTBf/5PyHk02L2fG7:YfF8jrgxA/XWCwrFPOTB35Pak0xG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2056 1284 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f18ec61bcd6c328fcb7e3c288c7f8f1ba69f84c643d355d40372fba6cb8bc65b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f18ec61bcd6c328fcb7e3c288c7f8f1ba69f84c643d355d40372fba6cb8bc65b.dll,#12⤵PID:2056
-