Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 19:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
052cd394d318dfe549cfad25d490d6af9647b0719a3980e5dddfc95edcdfd9c0.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
052cd394d318dfe549cfad25d490d6af9647b0719a3980e5dddfc95edcdfd9c0.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
052cd394d318dfe549cfad25d490d6af9647b0719a3980e5dddfc95edcdfd9c0.dll
-
Size
2.1MB
-
MD5
7d2d18b52bbf3f3f52e42d10bae08cd0
-
SHA1
f0c18d1402a3cd75f42a50b8e8feeb0717a30fb5
-
SHA256
052cd394d318dfe549cfad25d490d6af9647b0719a3980e5dddfc95edcdfd9c0
-
SHA512
048869df54a066247b93fe20eefee0e3fea470e3752a1adf53e1bcfbaf584f9a5b1b0b84c6a862ac6a9dca781edbd4e9bd095ada2c357d1202e2c60de7381f3a
-
SSDEEP
49152:KofQOhjGRWH/jOYaRtYDvCg+SkDDN9CCTTU:xfz5u4OZ+23DiCc
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2820 2060 rundll32.exe 28 PID 2060 wrote to memory of 2820 2060 rundll32.exe 28 PID 2060 wrote to memory of 2820 2060 rundll32.exe 28 PID 2060 wrote to memory of 2820 2060 rundll32.exe 28 PID 2060 wrote to memory of 2820 2060 rundll32.exe 28 PID 2060 wrote to memory of 2820 2060 rundll32.exe 28 PID 2060 wrote to memory of 2820 2060 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\052cd394d318dfe549cfad25d490d6af9647b0719a3980e5dddfc95edcdfd9c0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\052cd394d318dfe549cfad25d490d6af9647b0719a3980e5dddfc95edcdfd9c0.dll,#12⤵PID:2820
-