General
-
Target
http://dgsjgh
-
Sample
240925-rg8j4ashla
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://dgsjgh
Resource
win7-20240903-en
22 signatures
1800 seconds
Malware Config
Targets
-
-
Target
http://dgsjgh
-
System Binary Proxy Execution: Rundll32
Abuse Rundll32 to proxy execution of malicious code.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-