Analysis
-
max time kernel
138s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
d944fedcec0846a71aa29869cbe461af3449fb6aad17653b83af2d400070d26b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d944fedcec0846a71aa29869cbe461af3449fb6aad17653b83af2d400070d26b.dll
Resource
win10v2004-20220812-en
General
-
Target
d944fedcec0846a71aa29869cbe461af3449fb6aad17653b83af2d400070d26b.dll
-
Size
896KB
-
MD5
10bd3127a94a4ba2f2f4b80da5e15b47
-
SHA1
dfc644bcf2723d8de7d23d55533461eeeacab72c
-
SHA256
d944fedcec0846a71aa29869cbe461af3449fb6aad17653b83af2d400070d26b
-
SHA512
2da0b7ef81f5dcc54d86e9df150bf494a512e2bf231295544bb934ed522a70586738a39014bbc7fd17dddf05d44c56cb8d2707808703055905e8f643490f0047
-
SSDEEP
12288:UHkxoM82V0P0dFSZ2JCL8gkR5U+F6gFjKkhGEGT/43i:UH4oMD6FggG5U+F6gJKLb43i
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1304 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1304 4900 rundll32.exe 80 PID 4900 wrote to memory of 1304 4900 rundll32.exe 80 PID 4900 wrote to memory of 1304 4900 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d944fedcec0846a71aa29869cbe461af3449fb6aad17653b83af2d400070d26b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d944fedcec0846a71aa29869cbe461af3449fb6aad17653b83af2d400070d26b.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1304
-