Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 05:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c2434dede4d352c54907a3e77b6a724ec9ba1c2b3e2a0bdd1f4753f980a5470f.dll
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c2434dede4d352c54907a3e77b6a724ec9ba1c2b3e2a0bdd1f4753f980a5470f.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
c2434dede4d352c54907a3e77b6a724ec9ba1c2b3e2a0bdd1f4753f980a5470f.dll
-
Size
6KB
-
MD5
b3b1592e9647685fd936a773aa94c34f
-
SHA1
06446801df1b8895c7901b6c0d97058f080a67a0
-
SHA256
c2434dede4d352c54907a3e77b6a724ec9ba1c2b3e2a0bdd1f4753f980a5470f
-
SHA512
e539daee458bc0e0e294a05aceacaeb0d09d5aaafbdbd394e3e2043c9b2ddba1cd6103a7ca48c133cf30fb621eb8bc5c8127b406e5e47340f308afb95093f3df
-
SSDEEP
48:6WQV5YVOqtV0H1pw9ygYVUG0jB+BDq9J5SC:8qtV0HAr4KB+FqX5SC
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2672 2372 rundll32.exe 30 PID 2372 wrote to memory of 2672 2372 rundll32.exe 30 PID 2372 wrote to memory of 2672 2372 rundll32.exe 30 PID 2372 wrote to memory of 2672 2372 rundll32.exe 30 PID 2372 wrote to memory of 2672 2372 rundll32.exe 30 PID 2372 wrote to memory of 2672 2372 rundll32.exe 30 PID 2372 wrote to memory of 2672 2372 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2434dede4d352c54907a3e77b6a724ec9ba1c2b3e2a0bdd1f4753f980a5470f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2434dede4d352c54907a3e77b6a724ec9ba1c2b3e2a0bdd1f4753f980a5470f.dll,#12⤵PID:2672
-