Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 06:51
Behavioral task
behavioral1
Sample
7fb70df5d535857b5c229254ec8274550cc3fe4ddbc0a78cdd98f3332c2629d8N.dll
Resource
win7-20240903-en
windows7-x64
1 signatures
120 seconds
Behavioral task
behavioral2
Sample
7fb70df5d535857b5c229254ec8274550cc3fe4ddbc0a78cdd98f3332c2629d8N.dll
Resource
win10v2004-20241007-en
windows10-2004-x64
0 signatures
120 seconds
General
-
Target
7fb70df5d535857b5c229254ec8274550cc3fe4ddbc0a78cdd98f3332c2629d8N.dll
-
Size
2.3MB
-
MD5
993578523d3c64d02a4af460694f7cf0
-
SHA1
edecc2ef0c7a4ec9ed8d31c2cabb08631c91d081
-
SHA256
7fb70df5d535857b5c229254ec8274550cc3fe4ddbc0a78cdd98f3332c2629d8
-
SHA512
39ae0d968d9839bd66450bc01a6ae8d29345190f108f4e4172bd2138eca098494a175b22d9549f3947d3bf93552f8a86f607c02f15596df30720be8818f95e94
-
SSDEEP
49152:2te5uI3Oe4DiBqcWeyh7p4JumqBq7CdJywzqPGmTLBx:253YumB7Ch1mnB
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2696 2644 rundll32.exe 30 PID 2644 wrote to memory of 2696 2644 rundll32.exe 30 PID 2644 wrote to memory of 2696 2644 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fb70df5d535857b5c229254ec8274550cc3fe4ddbc0a78cdd98f3332c2629d8N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2644 -s 1562⤵PID:2696
-