Analysis
-
max time kernel
91s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
c58c0cc93ec9aac051bff56aeaba223868b5d3a855d390c8dc76cf51a4e58379.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c58c0cc93ec9aac051bff56aeaba223868b5d3a855d390c8dc76cf51a4e58379.dll
Resource
win10v2004-20220812-en
General
-
Target
c58c0cc93ec9aac051bff56aeaba223868b5d3a855d390c8dc76cf51a4e58379.dll
-
Size
401KB
-
MD5
64c7b70f95d7d533ce814a735f0bd994
-
SHA1
473081f403424739731a26a9d596fbb2678cbb1a
-
SHA256
c58c0cc93ec9aac051bff56aeaba223868b5d3a855d390c8dc76cf51a4e58379
-
SHA512
349d228840650a4d6e48984d17c3990948aef28fbda6f1ae7f608daf2335668c075390ecbc7f9f67b052548c046fb541d73a17960574bd851864b86978cadf1e
-
SSDEEP
6144:lyJUOFk1d90m6E6qMlB9G8vJfdj+tLTBCi9O1v:Yk10ududJ1j+tLTAi
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4872 rundll32.exe 4872 rundll32.exe 4872 rundll32.exe 4872 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4872 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4872 4832 rundll32.exe 82 PID 4832 wrote to memory of 4872 4832 rundll32.exe 82 PID 4832 wrote to memory of 4872 4832 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c58c0cc93ec9aac051bff56aeaba223868b5d3a855d390c8dc76cf51a4e58379.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c58c0cc93ec9aac051bff56aeaba223868b5d3a855d390c8dc76cf51a4e58379.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4872
-