Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
56622e82a4cbe7893866f2637ec2651f39b9d99cd0d07408aafad56350a4cea5.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
56622e82a4cbe7893866f2637ec2651f39b9d99cd0d07408aafad56350a4cea5.dll
Resource
win10v2004-20240508-en
General
-
Target
56622e82a4cbe7893866f2637ec2651f39b9d99cd0d07408aafad56350a4cea5.dll
-
Size
46KB
-
MD5
f27af6fffff29a427b586f6223afc3cc
-
SHA1
170bf98a2ec231833a3dff369dbf0082d0570d77
-
SHA256
56622e82a4cbe7893866f2637ec2651f39b9d99cd0d07408aafad56350a4cea5
-
SHA512
8df4356b67499de9e33b8b48bf0c0d61cae00383ce786586a9d9df0c180f541a1440f38c5f1ebb2c1169006febcf810b84bdc6c6bc1a1e02f8f063e4ee6cee94
-
SSDEEP
768:/L40Gy309O4iqhZgKpJowpL++7DWGuTuEjrOzAb6XTbJGtp:/LEy3NkZgKpJowp/7SGauEjr96jbJyp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1784 2188 rundll32.exe 28 PID 2188 wrote to memory of 1784 2188 rundll32.exe 28 PID 2188 wrote to memory of 1784 2188 rundll32.exe 28 PID 2188 wrote to memory of 1784 2188 rundll32.exe 28 PID 2188 wrote to memory of 1784 2188 rundll32.exe 28 PID 2188 wrote to memory of 1784 2188 rundll32.exe 28 PID 2188 wrote to memory of 1784 2188 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56622e82a4cbe7893866f2637ec2651f39b9d99cd0d07408aafad56350a4cea5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56622e82a4cbe7893866f2637ec2651f39b9d99cd0d07408aafad56350a4cea5.dll,#12⤵PID:1784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5e668144c7017b612482ff3d5c0b934a6
SHA10c2093f4732c4cc21bcc5f464c566d3b44d8483d
SHA256256d2667e766ec7da4f52e36b49c324f0eedf8af6ce7c5c24cc123f48eb62c90
SHA51238d75baeb8e489c0bcede3f63b19a0a77c09f3164224ecd630b9d983424ebb45e9cdf0d4fcd1b9122ec79c0427e0c37fd05095c66f91b044e786979d7c431f3d