Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
31/10/2022, 20:06
Behavioral task
behavioral1
Sample
0a3621266e47dc68917eaf421731de59cd25aa7c2594c03e1ce1724a2ae025ec.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0a3621266e47dc68917eaf421731de59cd25aa7c2594c03e1ce1724a2ae025ec.dll
Resource
win10v2004-20220901-en
General
-
Target
0a3621266e47dc68917eaf421731de59cd25aa7c2594c03e1ce1724a2ae025ec.dll
-
Size
382KB
-
MD5
d660acae39ad3764c14f057169e75b81
-
SHA1
d93c1686ca70a2f561ff93eb31b507a8b865e21a
-
SHA256
0a3621266e47dc68917eaf421731de59cd25aa7c2594c03e1ce1724a2ae025ec
-
SHA512
7542295510eea15986dc8123859ffe6f5b71e8fc1975c5bda740808fd5507ac0bc0c96c05701fad99f7ea62e66da0572f495c6c37eb11d7330fe23bf2583baff
-
SSDEEP
6144:q2MnPGBYklnxB31CMR/v6qWRX8by+AH3zYowtlhR9iorCqbw+ugYyE77/mXLLR:qrUN9X6qxm38oYlhRBrCqbX1k7/w5
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a3621266e47dc68917eaf421731de59cd25aa7c2594c03e1ce1724a2ae025ec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a3621266e47dc68917eaf421731de59cd25aa7c2594c03e1ce1724a2ae025ec.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1496
-