Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
3e174f3c021da140226dfc23ac53fcc187aec9135120aeac3859dc3593e81dcc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e174f3c021da140226dfc23ac53fcc187aec9135120aeac3859dc3593e81dcc.dll
Resource
win10v2004-20221111-en
General
-
Target
3e174f3c021da140226dfc23ac53fcc187aec9135120aeac3859dc3593e81dcc.dll
-
Size
652KB
-
MD5
136bd85eb6f76507741bf698081d7fb0
-
SHA1
633683b32ac90abf40291cb3639ba465b89df6e2
-
SHA256
3e174f3c021da140226dfc23ac53fcc187aec9135120aeac3859dc3593e81dcc
-
SHA512
f43f50ac6630f8359a372adc80006817eba8c4cccd50becb1a0b8e9b7ebade8432f1f932e4ef8cc96afcb20bb84301e49272a6e738f64b1ec9b591272b2d85ef
-
SSDEEP
6144:ryFWeVNzYakPdVsveysoChHStLoQ4oRvsY9hckEWJroTNpcAup3pIKonIQJNpU:ryFWeV8PdcrsoChyd3UJWKTkJVuHy
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1760 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 852 wrote to memory of 1760 852 rundll32.exe 27 PID 852 wrote to memory of 1760 852 rundll32.exe 27 PID 852 wrote to memory of 1760 852 rundll32.exe 27 PID 852 wrote to memory of 1760 852 rundll32.exe 27 PID 852 wrote to memory of 1760 852 rundll32.exe 27 PID 852 wrote to memory of 1760 852 rundll32.exe 27 PID 852 wrote to memory of 1760 852 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e174f3c021da140226dfc23ac53fcc187aec9135120aeac3859dc3593e81dcc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e174f3c021da140226dfc23ac53fcc187aec9135120aeac3859dc3593e81dcc.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1760
-