Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:12
Static task
static1
Behavioral task
behavioral1
Sample
c2c54077a322b98e8ff65a82605390dabcc5916d709943ec833fdb7e25675ca2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2c54077a322b98e8ff65a82605390dabcc5916d709943ec833fdb7e25675ca2.dll
Resource
win10v2004-20220901-en
General
-
Target
c2c54077a322b98e8ff65a82605390dabcc5916d709943ec833fdb7e25675ca2.dll
-
Size
83KB
-
MD5
072de9ed69e0be91675d716936c59d86
-
SHA1
a3c4d4d4485b459f266ff77ac0e1cafea2ea88b4
-
SHA256
c2c54077a322b98e8ff65a82605390dabcc5916d709943ec833fdb7e25675ca2
-
SHA512
530e48d5182e853cfdb55d4c1445e8035db8be7fdca24e420ffcf50af7d9f0226f32b06413d89d7adb8e4c066f8a212ad98cd7cbf7125cf7cdab8f5b64428736
-
SSDEEP
1536:KzWAnRBqDgdlWTmRIA9jqz+bksCWAHaIcQTT/y3eNyDyN1VyIo:AlwQgSSOqq7wSeo0q
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 4800 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2308 wrote to memory of 4800 2308 rundll32.exe rundll32.exe PID 2308 wrote to memory of 4800 2308 rundll32.exe rundll32.exe PID 2308 wrote to memory of 4800 2308 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2c54077a322b98e8ff65a82605390dabcc5916d709943ec833fdb7e25675ca2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2c54077a322b98e8ff65a82605390dabcc5916d709943ec833fdb7e25675ca2.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4800