Analysis
-
max time kernel
8s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:10
Static task
static1
Behavioral task
behavioral1
Sample
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll
Resource
win10v2004-20220901-en
General
-
Target
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll
-
Size
745KB
-
MD5
98790c0105321d288730677a6c04eed0
-
SHA1
d35c19c8ec2093b841d4613e7104d7a63c330824
-
SHA256
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31
-
SHA512
3f76289eab3839956e61c527b21fe43341a43ffaffc88c82cf31bce4cebec7b99cafcad6fdb695a4b89604adc072e53d824c3c1ad4d88483909f1ae8a86fa117
-
SSDEEP
12288:9ntdb/ULJrQ2I+7EBz0J6dHloNLxFxJSn3gZ:9njzULJk25oBzHdHiP1SnQ
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1320 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1320 1712 rundll32.exe 27 PID 1712 wrote to memory of 1320 1712 rundll32.exe 27 PID 1712 wrote to memory of 1320 1712 rundll32.exe 27 PID 1712 wrote to memory of 1320 1712 rundll32.exe 27 PID 1712 wrote to memory of 1320 1712 rundll32.exe 27 PID 1712 wrote to memory of 1320 1712 rundll32.exe 27 PID 1712 wrote to memory of 1320 1712 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1320
-