Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 20:27
Behavioral task
behavioral1
Sample
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll
-
Size
3.6MB
-
MD5
2938f10cb7267c934482b4a66d5a48a5
-
SHA1
56ae74b6607e1dc08ce66d0fd89aee869a497d88
-
SHA256
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc
-
SHA512
fcaac8f7e2fc984018591875d7387decfe13ed3dd1039dfeaa55227fbcd8c4231311c0555c23b70abcbfdb9f3a5fcde5ba323d43a8b14620031959bf27a84f47
-
SSDEEP
49152:foI8FGfW6bf6Z79OTzCO5Y6ke3hHL2LzUQS71Oe88d3O77pCcFUI7QVOT4:wI+Gf7bf+BOOY3hGQH178H+UQI
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/932-56-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-57-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-58-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-60-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-62-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-64-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-66-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-68-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-70-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-72-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-74-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-76-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-78-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-80-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-82-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-84-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-86-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-88-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-90-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-92-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-94-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-96-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-98-0x00000000008D0000-0x000000000090F000-memory.dmp upx behavioral1/memory/932-100-0x00000000008D0000-0x000000000090F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 932 rundll32.exe 932 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 976 wrote to memory of 932 976 rundll32.exe 28 PID 976 wrote to memory of 932 976 rundll32.exe 28 PID 976 wrote to memory of 932 976 rundll32.exe 28 PID 976 wrote to memory of 932 976 rundll32.exe 28 PID 976 wrote to memory of 932 976 rundll32.exe 28 PID 976 wrote to memory of 932 976 rundll32.exe 28 PID 976 wrote to memory of 932 976 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:932
-