Analysis
-
max time kernel
92s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
eb6803a8d52b0fa8e7f805c4a3ca3c7b0904d77e518668dc3c0bde64acd2603c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb6803a8d52b0fa8e7f805c4a3ca3c7b0904d77e518668dc3c0bde64acd2603c.dll
Resource
win10v2004-20220812-en
General
-
Target
eb6803a8d52b0fa8e7f805c4a3ca3c7b0904d77e518668dc3c0bde64acd2603c.dll
-
Size
84KB
-
MD5
5690e2fa3229ad5c72c6f7d2e84d5e75
-
SHA1
be5915bdf5c046701ccc76fd7cf921af550fe3ad
-
SHA256
eb6803a8d52b0fa8e7f805c4a3ca3c7b0904d77e518668dc3c0bde64acd2603c
-
SHA512
618a79ee2eac335d92fe541de9eb54c14dbcf6ce06a29131618f8b36555a2355e0e2e1dae20174c1cbe87fe2ab9e54a0a535566944ab206434bf0bb5f8d51075
-
SSDEEP
1536:jUe0FC0z0NHfE8ZfCegS+PTghjKdU5wImNeNrfb0rmLCWN1imqG3qhGwRML:9PNfCLtqONCYS+s1LqyJwRk
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
rundll32.exepid process 3460 rundll32.exe 3460 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4416 wrote to memory of 3460 4416 rundll32.exe rundll32.exe PID 4416 wrote to memory of 3460 4416 rundll32.exe rundll32.exe PID 4416 wrote to memory of 3460 4416 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb6803a8d52b0fa8e7f805c4a3ca3c7b0904d77e518668dc3c0bde64acd2603c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb6803a8d52b0fa8e7f805c4a3ca3c7b0904d77e518668dc3c0bde64acd2603c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3460