Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
316dbf03e77fb8b4d59e7f889a6480170135572a65470c5de1b565d5fcf63619.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
316dbf03e77fb8b4d59e7f889a6480170135572a65470c5de1b565d5fcf63619.dll
Resource
win10v2004-20240426-en
General
-
Target
316dbf03e77fb8b4d59e7f889a6480170135572a65470c5de1b565d5fcf63619.dll
-
Size
82KB
-
MD5
948f25401a60e6cdf3e3b4f25c0aef40
-
SHA1
5f675dbe4796e03c438817db260a90af33bf3f3a
-
SHA256
316dbf03e77fb8b4d59e7f889a6480170135572a65470c5de1b565d5fcf63619
-
SHA512
e024498e243a9adf83fd72cb0cf53b85d7c2137e83b94d406f25937cc57d238b22028490edb46518d248e0abf9944da514113de8cb1d1a6c6d101d6dbaf889d1
-
SSDEEP
1536:mhXhEXC+6+ZRxZeeirlqQ0nca4wnZgaLktA+31+SY4sWlcdliSWk8/msahOV:mh+XVxYVJqQ0pZg6vFlrWksahOV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1956 2080 rundll32.exe 28 PID 2080 wrote to memory of 1956 2080 rundll32.exe 28 PID 2080 wrote to memory of 1956 2080 rundll32.exe 28 PID 2080 wrote to memory of 1956 2080 rundll32.exe 28 PID 2080 wrote to memory of 1956 2080 rundll32.exe 28 PID 2080 wrote to memory of 1956 2080 rundll32.exe 28 PID 2080 wrote to memory of 1956 2080 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\316dbf03e77fb8b4d59e7f889a6480170135572a65470c5de1b565d5fcf63619.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\316dbf03e77fb8b4d59e7f889a6480170135572a65470c5de1b565d5fcf63619.dll,#12⤵PID:1956
-