Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
cedd7c680ac2da3e3628ceed71d676d612eea25ac86965bbab5cd2411940c028.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cedd7c680ac2da3e3628ceed71d676d612eea25ac86965bbab5cd2411940c028.dll
Resource
win10v2004-20220812-en
General
-
Target
cedd7c680ac2da3e3628ceed71d676d612eea25ac86965bbab5cd2411940c028.dll
-
Size
41KB
-
MD5
b37e26bb5f7369e85770b153d22cf593
-
SHA1
dd3286c8838c4000674c066b254304ca241557b7
-
SHA256
cedd7c680ac2da3e3628ceed71d676d612eea25ac86965bbab5cd2411940c028
-
SHA512
8758f931e9377a649d3375cd49110f7081993a167d79b0f37d9c1c57941f5a587cf89b0ef3e7dacb834795ddbc3faaae0d2c3719c5c7bda92feb39cf2d4ef3c8
-
SSDEEP
768:txjgMLSjLNe/qB46qsm6mSn8uaOuaFqA3v45xWbLQgMWAOBXv3uhNn:Xjg4gNepum6jRbIv5xCQgMGB+x
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 2604 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4636 wrote to memory of 2604 4636 rundll32.exe rundll32.exe PID 4636 wrote to memory of 2604 4636 rundll32.exe rundll32.exe PID 4636 wrote to memory of 2604 4636 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cedd7c680ac2da3e3628ceed71d676d612eea25ac86965bbab5cd2411940c028.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cedd7c680ac2da3e3628ceed71d676d612eea25ac86965bbab5cd2411940c028.dll,#12⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2604-132-0x0000000000000000-mapping.dmp
-
memory/2604-133-0x0000000000FF0000-0x0000000000FF8000-memory.dmpFilesize
32KB
-
memory/2604-134-0x0000000001390000-0x000000000139F000-memory.dmpFilesize
60KB
-
memory/2604-135-0x00000000013B0000-0x00000000013B8000-memory.dmpFilesize
32KB