Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll
Resource
win10v2004-20220901-en
General
-
Target
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll
-
Size
745KB
-
MD5
98790c0105321d288730677a6c04eed0
-
SHA1
d35c19c8ec2093b841d4613e7104d7a63c330824
-
SHA256
806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31
-
SHA512
3f76289eab3839956e61c527b21fe43341a43ffaffc88c82cf31bce4cebec7b99cafcad6fdb695a4b89604adc072e53d824c3c1ad4d88483909f1ae8a86fa117
-
SSDEEP
12288:9ntdb/ULJrQ2I+7EBz0J6dHloNLxFxJSn3gZ:9njzULJk25oBzHdHiP1SnQ
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4540 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4540 4964 rundll32.exe 82 PID 4964 wrote to memory of 4540 4964 rundll32.exe 82 PID 4964 wrote to memory of 4540 4964 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\806f16f833895cf7e243321dbd684ec1f989915686a0b168ecfef288c38e4d31.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4540
-