Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 19:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1bd053c468b224ce617e39bfbc7058a5ca8b510e48bfccb894837fd19e4942bf.dll
Resource
win7-20240611-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1bd053c468b224ce617e39bfbc7058a5ca8b510e48bfccb894837fd19e4942bf.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1bd053c468b224ce617e39bfbc7058a5ca8b510e48bfccb894837fd19e4942bf.dll
-
Size
7KB
-
MD5
4236522ded0fb20593b72c6f93794ad8
-
SHA1
63dd0de0d46068650a217bdaf048976012b4baec
-
SHA256
1bd053c468b224ce617e39bfbc7058a5ca8b510e48bfccb894837fd19e4942bf
-
SHA512
608ac43ef7ee7e4db7636f7de99fdeb44a047c5ffc6c8a101ff5c29e5b171f525726840d2e74f9c34a57709c361d0b62c4de5cf36a55b21ca5995b4336d370a6
-
SSDEEP
192:unSR6bgYGqcv3xjzNbqQgtbLmNVZxxSytsX:uZdk3xjBbaNLmNV7xHsX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2072 2088 rundll32.exe 28 PID 2088 wrote to memory of 2072 2088 rundll32.exe 28 PID 2088 wrote to memory of 2072 2088 rundll32.exe 28 PID 2088 wrote to memory of 2072 2088 rundll32.exe 28 PID 2088 wrote to memory of 2072 2088 rundll32.exe 28 PID 2088 wrote to memory of 2072 2088 rundll32.exe 28 PID 2088 wrote to memory of 2072 2088 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bd053c468b224ce617e39bfbc7058a5ca8b510e48bfccb894837fd19e4942bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bd053c468b224ce617e39bfbc7058a5ca8b510e48bfccb894837fd19e4942bf.dll,#12⤵PID:2072
-