Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
7530df1b98f1792351a49160be8961f7dd4b7073a6f13e2bb02dc853c6b885e6.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7530df1b98f1792351a49160be8961f7dd4b7073a6f13e2bb02dc853c6b885e6.dll
Resource
win10v2004-20240709-en
General
-
Target
7530df1b98f1792351a49160be8961f7dd4b7073a6f13e2bb02dc853c6b885e6.dll
-
Size
7.1MB
-
MD5
f7028f1da6247c4b26832d8e59ee3fb5
-
SHA1
804553acd935c0a978c11b0da6fbae4e1b18c07a
-
SHA256
7530df1b98f1792351a49160be8961f7dd4b7073a6f13e2bb02dc853c6b885e6
-
SHA512
8b25191d67bf80135b68484c26fba4c250b0046286d09dc96f35713f2ddb0a11851a8d523a11a136a92d52202e5a196d7701df013991397c1f6275a7ffcdb469
-
SSDEEP
98304:yche4hvsjnWtSfxZu3WTQwFcgdxUFZ9LWEDctV5jIqB4n0hLXR:ySvsjnWcfxZu6LFUZWEDctVBO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3056 4800 rundll32.exe 83 PID 4800 wrote to memory of 3056 4800 rundll32.exe 83 PID 4800 wrote to memory of 3056 4800 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7530df1b98f1792351a49160be8961f7dd4b7073a6f13e2bb02dc853c6b885e6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7530df1b98f1792351a49160be8961f7dd4b7073a6f13e2bb02dc853c6b885e6.dll,#12⤵PID:3056
-