Analysis
-
max time kernel
158s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:50
Static task
static1
Behavioral task
behavioral1
Sample
bf9d69e6915433b07dd24880e21f6625621b7c35d2f6e01c7ebf55056fa9db29.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bf9d69e6915433b07dd24880e21f6625621b7c35d2f6e01c7ebf55056fa9db29.dll
Resource
win10v2004-20221111-en
General
-
Target
bf9d69e6915433b07dd24880e21f6625621b7c35d2f6e01c7ebf55056fa9db29.dll
-
Size
936KB
-
MD5
e19d6746df78bb445ba65785e3935046
-
SHA1
44b6e187f12c2adf8d5cb1c95f8663374a87c305
-
SHA256
bf9d69e6915433b07dd24880e21f6625621b7c35d2f6e01c7ebf55056fa9db29
-
SHA512
5e867a89caf66d64d5601844dc914b9a55c8e29c81c1747374a658e94c339d4ff6d4ba872cd786cf6ad3d3a75244e6efe68ba34c3d901bb4a1d46aeb80b7e42d
-
SSDEEP
12288:GQqPOnD5PM0N9SFm4o7M9AKDlg3l1zAAzaBpz1sDllSR:GQJk0TSFg7zzAl1suR
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1336 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1104 wrote to memory of 1336 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 1336 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 1336 1104 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf9d69e6915433b07dd24880e21f6625621b7c35d2f6e01c7ebf55056fa9db29.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf9d69e6915433b07dd24880e21f6625621b7c35d2f6e01c7ebf55056fa9db29.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1336
-