Analysis
-
max time kernel
180s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:38
Behavioral task
behavioral1
Sample
ecd12369a94ba419ece5cd90988c62bf36d1797813cc5c1cf511e9b89b44a4ef.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ecd12369a94ba419ece5cd90988c62bf36d1797813cc5c1cf511e9b89b44a4ef.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ecd12369a94ba419ece5cd90988c62bf36d1797813cc5c1cf511e9b89b44a4ef.dll
-
Size
334KB
-
MD5
ea35e7bb2a55f72f79677c4efbdd8dbb
-
SHA1
1dbc54bb85422a113edc337a6fe918991033713a
-
SHA256
ecd12369a94ba419ece5cd90988c62bf36d1797813cc5c1cf511e9b89b44a4ef
-
SHA512
38aac04cef2e10928fcc6ea76d05650b0532cfeebde9547245659c0a6e6635703f32ae541e6e6f44319e8698ad9463500480e63fe807e778ba23714b774627d9
-
SSDEEP
6144:x3zXs7y67Odj+0dVZ0yuz6Bq45b9+KDQh2TVsHthAl9r14kyPj+IkFRJ:S266dNVZoSHh+K1TVstC
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3716 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3716 3188 rundll32.exe 83 PID 3188 wrote to memory of 3716 3188 rundll32.exe 83 PID 3188 wrote to memory of 3716 3188 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecd12369a94ba419ece5cd90988c62bf36d1797813cc5c1cf511e9b89b44a4ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecd12369a94ba419ece5cd90988c62bf36d1797813cc5c1cf511e9b89b44a4ef.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3716 -ip 37161⤵PID:2156