Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 22:52
Static task
static1
Behavioral task
behavioral1
Sample
604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll
Resource
win10v2004-20240709-en
General
-
Target
604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll
-
Size
659KB
-
MD5
be7d0f0c186f2c7bf46bbbf59575e7ad
-
SHA1
a11ebcf9beba3ec32749583c3d1500dfcf4880e7
-
SHA256
604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d
-
SHA512
906fcb115d2d51c174223a1fede1b91856b2fddb62ff81c60a89d0c0203e5ab3721b989f4bb7a385910e4b057e7525ffc3b7b14101f067f736a5cbee1d185351
-
SSDEEP
12288:p7tJrlrlWNc1J4eKtvD5N9nylBNHdvUNUsLM5sVgI2oqXU0VXLfCF9rP4NZO9OY+:hBlBBdvxsLM5saoqe9rPYZHT/EJ2/HK4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2352 2536 rundll32.exe 29 PID 2536 wrote to memory of 2352 2536 rundll32.exe 29 PID 2536 wrote to memory of 2352 2536 rundll32.exe 29 PID 2536 wrote to memory of 2352 2536 rundll32.exe 29 PID 2536 wrote to memory of 2352 2536 rundll32.exe 29 PID 2536 wrote to memory of 2352 2536 rundll32.exe 29 PID 2536 wrote to memory of 2352 2536 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll,#12⤵PID:2352
-