Analysis
-
max time kernel
203s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
12c74a615edd6b47b5ef7d92fbc0a9a82a3ec4cfd9e0ab489ff5a69a5e164272.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12c74a615edd6b47b5ef7d92fbc0a9a82a3ec4cfd9e0ab489ff5a69a5e164272.dll
Resource
win10v2004-20221111-en
General
-
Target
12c74a615edd6b47b5ef7d92fbc0a9a82a3ec4cfd9e0ab489ff5a69a5e164272.dll
-
Size
778KB
-
MD5
131429bdbc191591e05832739ef8e554
-
SHA1
67832c404f45114614f6ef208b1b5031658d6a25
-
SHA256
12c74a615edd6b47b5ef7d92fbc0a9a82a3ec4cfd9e0ab489ff5a69a5e164272
-
SHA512
8fa31ef07aa39ddcd48ef28b94cc2c3451ecca9ac064077b85a2f824a50cfe86287304034c1465edc45621ed6070061faa9fde9f80c1d14ccbbfc5545fb12138
-
SSDEEP
12288:amvecaF4J/OnXhUg1DCn6KiAe/1cbvrfm+s+Qgj8Iv5UR+3:amGL42+g1nARbbmsQMv5B3
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2652 1836 rundll32.exe 81 PID 1836 wrote to memory of 2652 1836 rundll32.exe 81 PID 1836 wrote to memory of 2652 1836 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12c74a615edd6b47b5ef7d92fbc0a9a82a3ec4cfd9e0ab489ff5a69a5e164272.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12c74a615edd6b47b5ef7d92fbc0a9a82a3ec4cfd9e0ab489ff5a69a5e164272.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2652 -ip 26521⤵PID:5036