Analysis
-
max time kernel
472s -
max time network
424s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
0e61ecd0aad87a72d36bc10288303292859a800d2237ac9c32755d9e455e87e2_unpacked_x64.dll
Resource
win7-20220812-en
windows7-x64
5 signatures
600 seconds
General
-
Target
0e61ecd0aad87a72d36bc10288303292859a800d2237ac9c32755d9e455e87e2_unpacked_x64.dll
-
Size
112KB
-
MD5
1d9eb92dee117a6c39a538b2f2c50daa
-
SHA1
4310f5f11fb1259a6d50140959538d202d4aeca0
-
SHA256
deb88e78eb54a0297cd573231a8e0ddfadfced68ba4fbdc3c8ed2e035c52ed30
-
SHA512
1b80694d44e861e1a2b8ecdae90a7c0dd88d0b38e6155f72e55d14cf1f4ff86c79277104f9ced8714f44dfac66978153a36baf7c23faf5fc1c0b1c846868098c
-
SSDEEP
3072:ga3CJcJDyt3l2bOlxBuxNtTWNxltoTDP4BtKu9fj1LmbT:gayJcJfOvBuxqNxcTcK7n
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 1400 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Explorer.EXEdescription pid Process Token: SeShutdownPrivilege 1400 Explorer.EXE Token: SeShutdownPrivilege 1400 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
rundll32.exepid Process 1928 rundll32.exe 1928 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1928 wrote to memory of 1400 1928 rundll32.exe 19 PID 1928 wrote to memory of 1400 1928 rundll32.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e61ecd0aad87a72d36bc10288303292859a800d2237ac9c32755d9e455e87e2_unpacked_x64.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928
-