Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2022, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
6cb53fd823541b1a901c4bf7f45ef1aba0c902be86d14b4c7670f824f07fc477.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cb53fd823541b1a901c4bf7f45ef1aba0c902be86d14b4c7670f824f07fc477.dll
Resource
win10v2004-20220812-en
General
-
Target
6cb53fd823541b1a901c4bf7f45ef1aba0c902be86d14b4c7670f824f07fc477.dll
-
Size
1.0MB
-
MD5
81170e96543e3373976f3bd592bc197a
-
SHA1
9f5b1d611057a713fdf433b4d4ab39ffff4191c7
-
SHA256
6cb53fd823541b1a901c4bf7f45ef1aba0c902be86d14b4c7670f824f07fc477
-
SHA512
2202ed80b6a18f0982dfb6328e52dc9ed8462d40460e25d6a154ba215d36494e1f83c3d007d8f93565066bd528a772a5dbd1ca47cc6c87b7f5c34f06c90b6e7f
-
SSDEEP
24576:o3+hV78rw0y7ikovbut3G1WahnaWCg86/esfNyLIDXZ:o3i78y7ovbut3G1WaUWCgntfkLQXZ
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 552 rundll32.exe 552 rundll32.exe 552 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 552 4364 rundll32.exe 82 PID 4364 wrote to memory of 552 4364 rundll32.exe 82 PID 4364 wrote to memory of 552 4364 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6cb53fd823541b1a901c4bf7f45ef1aba0c902be86d14b4c7670f824f07fc477.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6cb53fd823541b1a901c4bf7f45ef1aba0c902be86d14b4c7670f824f07fc477.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:552
-