Analysis
-
max time kernel
117s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 23:11
Behavioral task
behavioral1
Sample
c6c6a9babe03f7fa1e8fff74a8939dd6f275f2368434e932e96cabd36b884fc7.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6c6a9babe03f7fa1e8fff74a8939dd6f275f2368434e932e96cabd36b884fc7.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c6c6a9babe03f7fa1e8fff74a8939dd6f275f2368434e932e96cabd36b884fc7.dll
-
Size
7KB
-
MD5
7363c18aaea8140f079c0515fbdb58b4
-
SHA1
93e7083f4d01cb76b2fcfe5e022f9c127b8ea6e9
-
SHA256
c6c6a9babe03f7fa1e8fff74a8939dd6f275f2368434e932e96cabd36b884fc7
-
SHA512
57da7481d6582ab18a997b86d54cedf2baced9a4077700524fa16fe0750c4dd889a24fa8d3e42ec1a550556009f9da7082ca6ecdd6590951a7aae17ea9b460e5
-
SSDEEP
96:zEqVQw271bTTFlvEbgOrXs/UJiFw7NhHP7jGbW+5E9nnUpU8km:zEaQwOpFFKrX3JNhHP7+W9n38f
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2356 rundll32.exe 2356 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2356 3364 rundll32.exe 79 PID 3364 wrote to memory of 2356 3364 rundll32.exe 79 PID 3364 wrote to memory of 2356 3364 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6c6a9babe03f7fa1e8fff74a8939dd6f275f2368434e932e96cabd36b884fc7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6c6a9babe03f7fa1e8fff74a8939dd6f275f2368434e932e96cabd36b884fc7.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2356
-