Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
516a336ed014f08c1081864f4ba4848e11ec6635b6cb9905189ae5f5e89497f9.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
516a336ed014f08c1081864f4ba4848e11ec6635b6cb9905189ae5f5e89497f9.dll
Resource
win10v2004-20240709-en
General
-
Target
516a336ed014f08c1081864f4ba4848e11ec6635b6cb9905189ae5f5e89497f9.dll
-
Size
1.9MB
-
MD5
f0025e66fb8a3e6e98f765245a6eb6b8
-
SHA1
cd1f9d8edb46b3567804bbac4c099e717a337f8f
-
SHA256
516a336ed014f08c1081864f4ba4848e11ec6635b6cb9905189ae5f5e89497f9
-
SHA512
b6f6644f4f934a79eecbb8de0c395aabf1e7f8d18cd36a78ac2d9bcd91112d39d35de1f4b8687440e39da306b14c65ecea85a85319293764058b85269e407f5d
-
SSDEEP
49152:WfCK+NulnGtBMzqCrnCCjR32O9LiQD07zLRVgaOzzaxo0b:Wb+N0GjMDrCJO9HD0MiGC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2912 2360 rundll32.exe 30 PID 2360 wrote to memory of 2912 2360 rundll32.exe 30 PID 2360 wrote to memory of 2912 2360 rundll32.exe 30 PID 2360 wrote to memory of 2912 2360 rundll32.exe 30 PID 2360 wrote to memory of 2912 2360 rundll32.exe 30 PID 2360 wrote to memory of 2912 2360 rundll32.exe 30 PID 2360 wrote to memory of 2912 2360 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516a336ed014f08c1081864f4ba4848e11ec6635b6cb9905189ae5f5e89497f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516a336ed014f08c1081864f4ba4848e11ec6635b6cb9905189ae5f5e89497f9.dll,#12⤵PID:2912
-