Analysis
-
max time kernel
41s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:37
Static task
static1
Behavioral task
behavioral1
Sample
2a57d00cd493f650cec5735ba7a8110153e8e10348edcdd3589b17714eea27c6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a57d00cd493f650cec5735ba7a8110153e8e10348edcdd3589b17714eea27c6.dll
Resource
win10v2004-20220812-en
General
-
Target
2a57d00cd493f650cec5735ba7a8110153e8e10348edcdd3589b17714eea27c6.dll
-
Size
1.4MB
-
MD5
fd71f2961edf08926077766be792a64d
-
SHA1
23f1f94036a9bd97d63bb6094b466354e0e38ce2
-
SHA256
2a57d00cd493f650cec5735ba7a8110153e8e10348edcdd3589b17714eea27c6
-
SHA512
f0ab8171c83fcf0e8ed873c9cf342608a93efb8f5550eea0ddbb88e60611177bd303f50fd40a7d7311af35542fc288bf43ef0020fd9c5c913db9b505b89650d3
-
SSDEEP
24576:xldVgBHgF2S9YUYdKxS5jAzRGzCkReds75oFBug4aRd4Yo4uYFWs7af:x9F2S9YUYdKx5IFReUKMid4Yo4tF77af
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2036 1740 rundll32.exe 28 PID 1740 wrote to memory of 2036 1740 rundll32.exe 28 PID 1740 wrote to memory of 2036 1740 rundll32.exe 28 PID 1740 wrote to memory of 2036 1740 rundll32.exe 28 PID 1740 wrote to memory of 2036 1740 rundll32.exe 28 PID 1740 wrote to memory of 2036 1740 rundll32.exe 28 PID 1740 wrote to memory of 2036 1740 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a57d00cd493f650cec5735ba7a8110153e8e10348edcdd3589b17714eea27c6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a57d00cd493f650cec5735ba7a8110153e8e10348edcdd3589b17714eea27c6.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2036
-