Analysis
-
max time kernel
90s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
f19a6794ef61b0f28cd051940033516768c10ee6367b55f25e6a4a70b72091c3.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f19a6794ef61b0f28cd051940033516768c10ee6367b55f25e6a4a70b72091c3.dll
Resource
win10v2004-20220812-en
General
-
Target
f19a6794ef61b0f28cd051940033516768c10ee6367b55f25e6a4a70b72091c3.dll
-
Size
892KB
-
MD5
5c3286858ec22510201f6c488960e1f5
-
SHA1
fb16955f5702876078cb046112dae949883497bf
-
SHA256
f19a6794ef61b0f28cd051940033516768c10ee6367b55f25e6a4a70b72091c3
-
SHA512
76d4844476b7c6791bb52d4cefdc5a2e8c260e4487026ff2bbaca1537fc0c71558a8cd2a03402366162d084b60b66292bd4e8ac8c144c7e5336804ce8ed63755
-
SSDEEP
12288:Xo9K1wBoC4SQPYpROpkPmBeomKCSOLXAwY8jbjUvyp9RSni38LBW:w4O+pf4JKpOLXAwYCbovyt38lW
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2304 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2304 2548 rundll32.exe 81 PID 2548 wrote to memory of 2304 2548 rundll32.exe 81 PID 2548 wrote to memory of 2304 2548 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f19a6794ef61b0f28cd051940033516768c10ee6367b55f25e6a4a70b72091c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f19a6794ef61b0f28cd051940033516768c10ee6367b55f25e6a4a70b72091c3.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2304
-