Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 08:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f850e9efd5353b905f4a4550b8867a063d4445f6136337e6a82235462f63a4df.dll
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f850e9efd5353b905f4a4550b8867a063d4445f6136337e6a82235462f63a4df.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
f850e9efd5353b905f4a4550b8867a063d4445f6136337e6a82235462f63a4df.dll
-
Size
6KB
-
MD5
302663e3108b58a9fb70ce695e1f2cb5
-
SHA1
8069229c74000365aeda6483478a63248584aebf
-
SHA256
f850e9efd5353b905f4a4550b8867a063d4445f6136337e6a82235462f63a4df
-
SHA512
fed94aa68ac2c9f70189719e0b6aaab74f8112d1fcd0772d9f67299754d1c11eb4392af6b7792cd06dffdc5403e7639103978c86cab19bfbc4032c05bc2edf5a
-
SSDEEP
48:6amN5YVOy1VEvy/dw25M+e0MB+BDq9J5SzXH:Wy1VEvayP+cB+FqX5SzX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2200 2368 rundll32.exe 30 PID 2368 wrote to memory of 2200 2368 rundll32.exe 30 PID 2368 wrote to memory of 2200 2368 rundll32.exe 30 PID 2368 wrote to memory of 2200 2368 rundll32.exe 30 PID 2368 wrote to memory of 2200 2368 rundll32.exe 30 PID 2368 wrote to memory of 2200 2368 rundll32.exe 30 PID 2368 wrote to memory of 2200 2368 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f850e9efd5353b905f4a4550b8867a063d4445f6136337e6a82235462f63a4df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f850e9efd5353b905f4a4550b8867a063d4445f6136337e6a82235462f63a4df.dll,#12⤵PID:2200
-