Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 10:50
Static task
static1
Behavioral task
behavioral1
Sample
68b91648d56b99dc5c14f2f151ef36410eee77cc7c6b916420ad1935809d61d2.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
68b91648d56b99dc5c14f2f151ef36410eee77cc7c6b916420ad1935809d61d2.dll
-
Size
1.5MB
-
MD5
b489e5d2c4c585af3d3149439b478155
-
SHA1
d2dad11492bde46c9adcbcc830f8df778282dd84
-
SHA256
68b91648d56b99dc5c14f2f151ef36410eee77cc7c6b916420ad1935809d61d2
-
SHA512
b280420e2b859171cc8ff8bfc68c4b1e8249bf0302d7037800d4ad4927a34e8cf04ca234919b6a609f0b2f47fb0951c5982e8fe6cb9f488e86c89a6005d5ac3f
-
SSDEEP
24576:Gx0YK+I4ZIxYWu/CGaJ4tBv8aN5ekIILRCdZPgv6KICHJqPvvN4dThZT:Gx0YNwPuxt9DekN+tgvHMK7Z
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 548 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 548 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27 PID 1148 wrote to memory of 548 1148 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\68b91648d56b99dc5c14f2f151ef36410eee77cc7c6b916420ad1935809d61d2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\68b91648d56b99dc5c14f2f151ef36410eee77cc7c6b916420ad1935809d61d2.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:548
-