Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
2acf112fb9b34136798b580dfedc23f0N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2acf112fb9b34136798b580dfedc23f0N.dll
Resource
win10v2004-20240704-en
General
-
Target
2acf112fb9b34136798b580dfedc23f0N.dll
-
Size
2.1MB
-
MD5
2acf112fb9b34136798b580dfedc23f0
-
SHA1
1a217af6538b0e0f7110a7fb6e2b9fa68ac07c8f
-
SHA256
b05a18df453289d00fc0a9fbc90ab9f215ab8f524f36f5332db2ecb499c6b6ad
-
SHA512
e410241b5066d18d47cd0f5b64b2637f226e5a71a73e940a731e90614e743ae0491654bf870ec48ae4c5555d3296620190a4802d9e9eed6e409352d52fd166f5
-
SSDEEP
49152:d/9gZX0xTDN8wtLrZif3sZr0L+VZFSQMMBup3J86+w:d/Zf5ZifMpoO6L
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1724 rundll32.exe 1724 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 2396 wrote to memory of 1836 2396 rundll32.exe 30 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31 PID 1836 wrote to memory of 1724 1836 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2acf112fb9b34136798b580dfedc23f0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2acf112fb9b34136798b580dfedc23f0N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\2acf112fb9b34136798b580dfedc23f0N.dll",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259446495 2624103⤵
- Loads dropped DLL
PID:1724
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\2acf112fb9b34136798b580dfedc23f0N.dll-\WixToolset.Dtf.WindowsInstaller.dll
Filesize193KB
MD5c18ca6b760638e1dac684b1c27778e7a
SHA172b45b1fe9dfd3dadc4ab29640191f9d7de0e9ad
SHA256862276ba8d789a675cbf396296ded493a841ccb5bcf4960e58a3eb7725699e8f
SHA5125437d431079f4d309787b5587786c7bbca0b3bf16725406f6e9282d2c026b6a3229d35b2d824a0e007cc08ec8d6dc39c48594e71ab0e66d123db819b160166a1