Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
ea6daa006561f1c00ac4f096aa83e1d3e550dc74e4d27eeef6e34f6333507b15.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea6daa006561f1c00ac4f096aa83e1d3e550dc74e4d27eeef6e34f6333507b15.dll
Resource
win10v2004-20240709-en
General
-
Target
ea6daa006561f1c00ac4f096aa83e1d3e550dc74e4d27eeef6e34f6333507b15.dll
-
Size
6KB
-
MD5
38875d7626aa307fcf8ce197fb878aba
-
SHA1
f658d0cf32dd431db796aaf714594b90eab13c6f
-
SHA256
ea6daa006561f1c00ac4f096aa83e1d3e550dc74e4d27eeef6e34f6333507b15
-
SHA512
3b1ad85ce25b7c638e928919291ccc03ad949784679ec7881f2c1df4799ce830615f700072e4cf1e59307d4adf61b52c1e5707d12db2eb9b1223a867023c55d7
-
SSDEEP
48:6++Z5YVOeJVkrm1pwbEX7PFUE7aaO0RB+BDq9J5S1XU:6eJVkrmgbCbFUaaaRB+FqX5S1k
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2300 2172 rundll32.exe 30 PID 2172 wrote to memory of 2300 2172 rundll32.exe 30 PID 2172 wrote to memory of 2300 2172 rundll32.exe 30 PID 2172 wrote to memory of 2300 2172 rundll32.exe 30 PID 2172 wrote to memory of 2300 2172 rundll32.exe 30 PID 2172 wrote to memory of 2300 2172 rundll32.exe 30 PID 2172 wrote to memory of 2300 2172 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea6daa006561f1c00ac4f096aa83e1d3e550dc74e4d27eeef6e34f6333507b15.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea6daa006561f1c00ac4f096aa83e1d3e550dc74e4d27eeef6e34f6333507b15.dll,#12⤵PID:2300
-