Analysis
-
max time kernel
91s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 20:27
Behavioral task
behavioral1
Sample
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll
-
Size
3.6MB
-
MD5
2938f10cb7267c934482b4a66d5a48a5
-
SHA1
56ae74b6607e1dc08ce66d0fd89aee869a497d88
-
SHA256
581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc
-
SHA512
fcaac8f7e2fc984018591875d7387decfe13ed3dd1039dfeaa55227fbcd8c4231311c0555c23b70abcbfdb9f3a5fcde5ba323d43a8b14620031959bf27a84f47
-
SSDEEP
49152:foI8FGfW6bf6Z79OTzCO5Y6ke3hHL2LzUQS71Oe88d3O77pCcFUI7QVOT4:wI+Gf7bf+BOOY3hGQH178H+UQI
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4912-133-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-134-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-135-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-137-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-139-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-141-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-143-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-145-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-147-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-149-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-151-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-153-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-155-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-157-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-159-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-161-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-163-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-165-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-167-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-169-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-171-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-173-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-175-0x0000000002380000-0x00000000023BF000-memory.dmp upx behavioral2/memory/4912-177-0x0000000002380000-0x00000000023BF000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4912 rundll32.exe 4912 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 648 wrote to memory of 4912 648 rundll32.exe 82 PID 648 wrote to memory of 4912 648 rundll32.exe 82 PID 648 wrote to memory of 4912 648 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\581e199721a3ac47a9bebca0cd25613dba8858e73fa1fd04006fcb63d4c48acc.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4912
-