Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 05:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a0eed0f256ca1894bd9f448bedeb540N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
7a0eed0f256ca1894bd9f448bedeb540N.dll
-
Size
759KB
-
MD5
7a0eed0f256ca1894bd9f448bedeb540
-
SHA1
a92509962c184b87170c6dac6479b2ea85ca8cb0
-
SHA256
d43d2f3de3c32a8805ba041d2fe7f4db9e4b1de52836067d437029ffb1699a70
-
SHA512
b9f5d117e2f80d4af88c320d6e2cc5f5de74822843024b92b3c44a1b95d54d48f7d2e4cfd05046328eec92d0621f9e72526965690ec43759bc1dd3141fe66680
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYY/:o6RI1Fo/wT3cJYYYYYYYYYYYY/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2304 5060 rundll32.exe 83 PID 5060 wrote to memory of 2304 5060 rundll32.exe 83 PID 5060 wrote to memory of 2304 5060 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a0eed0f256ca1894bd9f448bedeb540N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a0eed0f256ca1894bd9f448bedeb540N.dll,#12⤵PID:2304
-