Analysis
-
max time kernel
253s -
max time network
314s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:01
Behavioral task
behavioral1
Sample
b2e01ffcb1db1030cd903c8d59eae9ea3c25eb3d95171164fe96e4dffa6f667b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b2e01ffcb1db1030cd903c8d59eae9ea3c25eb3d95171164fe96e4dffa6f667b.dll
Resource
win10v2004-20221111-en
General
-
Target
b2e01ffcb1db1030cd903c8d59eae9ea3c25eb3d95171164fe96e4dffa6f667b.dll
-
Size
313KB
-
MD5
5686725ebd78d06c86ee0bfc39e731d0
-
SHA1
1479658580859b4f9bdfac0a274fa674f42a981a
-
SHA256
b2e01ffcb1db1030cd903c8d59eae9ea3c25eb3d95171164fe96e4dffa6f667b
-
SHA512
8db7e5c536c397b8315d6f62f1e1ddcfafa61224bc102c808614d306e1455e4f1cd0ec35796979933ac6804d85292dce57ad7d678915473e803d37d80ab8a1eb
-
SSDEEP
6144:pBSoYu7lTHcVk+KTmGEM6ZBweqtAMJZ+XBq4aQc8dLutBnCpI:pBewHTj6Z9qttJZ+xhueutBnP
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 2120 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4576 wrote to memory of 2120 4576 rundll32.exe rundll32.exe PID 4576 wrote to memory of 2120 4576 rundll32.exe rundll32.exe PID 4576 wrote to memory of 2120 4576 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2e01ffcb1db1030cd903c8d59eae9ea3c25eb3d95171164fe96e4dffa6f667b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2e01ffcb1db1030cd903c8d59eae9ea3c25eb3d95171164fe96e4dffa6f667b.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2120