Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll
Resource
win10v2004-20240611-en
General
-
Target
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll
-
Size
5KB
-
MD5
7cba43a2bf20029d16ac1c7d0633acab
-
SHA1
ba5575a4688e2f759039774435df6c87fda7da8b
-
SHA256
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0
-
SHA512
727a53b21698ae9852baaf0605a583f005b181f074875cf38e933fb1ee28abfc5cf4f4545eab790db6be8e9b2f3b91a8ad8eb3e1690da02c0372eaf1ea1589e6
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhsdN2CTp999Yg9N10Rh92YSG99k0:nEY2RrF1eqwi4uD58ihGs3uYcR6Q/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2176 2164 rundll32.exe 28 PID 2164 wrote to memory of 2176 2164 rundll32.exe 28 PID 2164 wrote to memory of 2176 2164 rundll32.exe 28 PID 2164 wrote to memory of 2176 2164 rundll32.exe 28 PID 2164 wrote to memory of 2176 2164 rundll32.exe 28 PID 2164 wrote to memory of 2176 2164 rundll32.exe 28 PID 2164 wrote to memory of 2176 2164 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll,#12⤵PID:2176
-