Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
43a691c33ca0b2e9ce14df0086207437c3e637834ba110cffd322dc42f5baae8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
43a691c33ca0b2e9ce14df0086207437c3e637834ba110cffd322dc42f5baae8.dll
Resource
win10v2004-20220901-en
General
-
Target
43a691c33ca0b2e9ce14df0086207437c3e637834ba110cffd322dc42f5baae8.dll
-
Size
263KB
-
MD5
0c1760614c26845e5000a0ef8b770a80
-
SHA1
30319758eaeebed73b8da06ef5ea74327ac4568f
-
SHA256
43a691c33ca0b2e9ce14df0086207437c3e637834ba110cffd322dc42f5baae8
-
SHA512
40bf26b1f5d5a92eba7cdc93226db26c47ef8cf8946c65545ec1f521eca0beb29120ccd99175aa1bc2ee406a508c5fd9f776c9f49a419c7487a7f342fa5f9fed
-
SSDEEP
6144:c9llMdk+OdewTVgPkFLVU1KEAUPHeTIyuyevfPRYGorxTo:cbqd8pTLVOKEPPv8evfJ0rxTo
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1228 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1228 1340 rundll32.exe 27 PID 1340 wrote to memory of 1228 1340 rundll32.exe 27 PID 1340 wrote to memory of 1228 1340 rundll32.exe 27 PID 1340 wrote to memory of 1228 1340 rundll32.exe 27 PID 1340 wrote to memory of 1228 1340 rundll32.exe 27 PID 1340 wrote to memory of 1228 1340 rundll32.exe 27 PID 1340 wrote to memory of 1228 1340 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43a691c33ca0b2e9ce14df0086207437c3e637834ba110cffd322dc42f5baae8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43a691c33ca0b2e9ce14df0086207437c3e637834ba110cffd322dc42f5baae8.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1228
-