Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
354c951c698257f4c264c41b6852ea95b977b6d10f6af5725eaf36ec227e4be8.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
354c951c698257f4c264c41b6852ea95b977b6d10f6af5725eaf36ec227e4be8.dll
Resource
win10v2004-20240508-en
General
-
Target
354c951c698257f4c264c41b6852ea95b977b6d10f6af5725eaf36ec227e4be8.dll
-
Size
213KB
-
MD5
9447870c6e55fdf22c31bad648ac5183
-
SHA1
b0ef6c72bc59436a9fd0a684ef9c5917db912c67
-
SHA256
354c951c698257f4c264c41b6852ea95b977b6d10f6af5725eaf36ec227e4be8
-
SHA512
c39c48e842a60d9ef86f387de2eed05cd4c9dcdd9f514141d1a3f4ee5d67b072f457e6da3ed025f5744a360fbfe193b4ab353700407571f6b05ecbcf95ea82e5
-
SSDEEP
3072:CZkRIFEVpCFDP2Fo5E8HIjD7fyfyZUt+uJBgyy7GykcVhxAg0FujTl+MbutP0Pfp:CZkiJIfjXacUtTTBy7pAOGP0Xp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1732 2420 rundll32.exe 28 PID 2420 wrote to memory of 1732 2420 rundll32.exe 28 PID 2420 wrote to memory of 1732 2420 rundll32.exe 28 PID 2420 wrote to memory of 1732 2420 rundll32.exe 28 PID 2420 wrote to memory of 1732 2420 rundll32.exe 28 PID 2420 wrote to memory of 1732 2420 rundll32.exe 28 PID 2420 wrote to memory of 1732 2420 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\354c951c698257f4c264c41b6852ea95b977b6d10f6af5725eaf36ec227e4be8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\354c951c698257f4c264c41b6852ea95b977b6d10f6af5725eaf36ec227e4be8.dll,#12⤵PID:1732
-