Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
25e5a54741a0aeefccc669802c30315ba42cc47a99665b87ab0373655939f052.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
25e5a54741a0aeefccc669802c30315ba42cc47a99665b87ab0373655939f052.dll
Resource
win10v2004-20240709-en
General
-
Target
25e5a54741a0aeefccc669802c30315ba42cc47a99665b87ab0373655939f052.dll
-
Size
1.5MB
-
MD5
3706ca89cb8c8cbf69594ecc1c9afdf2
-
SHA1
efc17c6ace80917ee293f1244772bacf627acfb0
-
SHA256
25e5a54741a0aeefccc669802c30315ba42cc47a99665b87ab0373655939f052
-
SHA512
d0abb97bfd705895eb6a2a3e2cdb44807e5d18a9ff092a0ed68ee36915e10fef29d19a0f8d1eda3aaa97c9a53a02df06998842c7b755556c708ef39df45fd8bc
-
SSDEEP
24576:Kgmj42MEVQPGEorkSY/X/7DkbSrh/qtoT/cgsxSPlKzNYXmdzweeq5//W68Sn:+jnMEVQuFkSkvkurNqtoTkgBczNYXmdT
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1120 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1120 2256 rundll32.exe 29 PID 2256 wrote to memory of 1120 2256 rundll32.exe 29 PID 2256 wrote to memory of 1120 2256 rundll32.exe 29 PID 2256 wrote to memory of 1120 2256 rundll32.exe 29 PID 2256 wrote to memory of 1120 2256 rundll32.exe 29 PID 2256 wrote to memory of 1120 2256 rundll32.exe 29 PID 2256 wrote to memory of 1120 2256 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25e5a54741a0aeefccc669802c30315ba42cc47a99665b87ab0373655939f052.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25e5a54741a0aeefccc669802c30315ba42cc47a99665b87ab0373655939f052.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-