Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 23:03
Behavioral task
behavioral1
Sample
8daa835ceefec4e729583fc43ca67ffc06a3381c7388a1c0432fcecf58e56e9c.dll
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8daa835ceefec4e729583fc43ca67ffc06a3381c7388a1c0432fcecf58e56e9c.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
8daa835ceefec4e729583fc43ca67ffc06a3381c7388a1c0432fcecf58e56e9c.dll
-
Size
17KB
-
MD5
6ef65e53d704d459ff42c8a7e889ad45
-
SHA1
2fb2ba106c6f8060314e27bf7becb44d6bdc86f2
-
SHA256
8daa835ceefec4e729583fc43ca67ffc06a3381c7388a1c0432fcecf58e56e9c
-
SHA512
7655105a0d07d0db220b68a926d623d1d57ccf2c6f2d117cb850f725123e72c9ed62ad8225e784cd5de18d8b25c6bb698f3990678b2b7f786f05792ffdd82fe7
-
SSDEEP
384:M0veNlU8Z43QmIf4oRBVmKTxn7XJZYQuBgAKZf3g:jezN+AmoRBcerDpuBuB
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1932 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1932 1500 rundll32.exe 27 PID 1500 wrote to memory of 1932 1500 rundll32.exe 27 PID 1500 wrote to memory of 1932 1500 rundll32.exe 27 PID 1500 wrote to memory of 1932 1500 rundll32.exe 27 PID 1500 wrote to memory of 1932 1500 rundll32.exe 27 PID 1500 wrote to memory of 1932 1500 rundll32.exe 27 PID 1500 wrote to memory of 1932 1500 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8daa835ceefec4e729583fc43ca67ffc06a3381c7388a1c0432fcecf58e56e9c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8daa835ceefec4e729583fc43ca67ffc06a3381c7388a1c0432fcecf58e56e9c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1932
-