Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
4e598f503253ad684fe9686215f88bf64f0e4eba193e26db6d99bea5e4b68453.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e598f503253ad684fe9686215f88bf64f0e4eba193e26db6d99bea5e4b68453.dll
Resource
win10v2004-20240611-en
General
-
Target
4e598f503253ad684fe9686215f88bf64f0e4eba193e26db6d99bea5e4b68453.dll
-
Size
90KB
-
MD5
f22ef3db748d6218784372be6f9b7a5c
-
SHA1
002a4cfa3ce54dff2c62cf04aa80d3104f6ab862
-
SHA256
4e598f503253ad684fe9686215f88bf64f0e4eba193e26db6d99bea5e4b68453
-
SHA512
7d018780a31918e00da9862e193cbcb8ae1eb43c0c40dbe8ce2099f4825986cfa758fad8c5281ca53d50e6c0965b1e152fe67b62b3c0bb157ca9f2f8f926e3b1
-
SSDEEP
1536:6r1TfDXW4Y83kD1M7XStYUqMuz56cwxxKEYfRn9A9kGQBUOQBTY7bi0xjCKmNfFa:uJ3S1M+tYU06cwxxKEYflBUfY7bi0tSa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1684 1224 rundll32.exe 28 PID 1224 wrote to memory of 1684 1224 rundll32.exe 28 PID 1224 wrote to memory of 1684 1224 rundll32.exe 28 PID 1224 wrote to memory of 1684 1224 rundll32.exe 28 PID 1224 wrote to memory of 1684 1224 rundll32.exe 28 PID 1224 wrote to memory of 1684 1224 rundll32.exe 28 PID 1224 wrote to memory of 1684 1224 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e598f503253ad684fe9686215f88bf64f0e4eba193e26db6d99bea5e4b68453.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e598f503253ad684fe9686215f88bf64f0e4eba193e26db6d99bea5e4b68453.dll,#12⤵PID:1684
-