Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 10:43
Behavioral task
behavioral1
Sample
f09860d04a653ddf387b9142bb14236ff16ab7db8d99b795a223f02c86604778.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f09860d04a653ddf387b9142bb14236ff16ab7db8d99b795a223f02c86604778.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
f09860d04a653ddf387b9142bb14236ff16ab7db8d99b795a223f02c86604778.dll
-
Size
800KB
-
MD5
0a24f6719574332fb605c8064c11fdf7
-
SHA1
b76997af244a63d007a47dad7dae017b11cc7431
-
SHA256
f09860d04a653ddf387b9142bb14236ff16ab7db8d99b795a223f02c86604778
-
SHA512
ca1dcfced0ac484f4d9761ff49c12f1c671379186c9e1a4f017b248b0f47d7a479c9fa60da9246b3adb4c48561370ceb5dc998f111719793b14c5622d170f9e0
-
SSDEEP
24576:VeL9DHqUsyr5kvTFwnh1y8+25WNGcSUd:VeLRmydmTF07y8T569Nd
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4576-134-0x0000000010000000-0x000000001020B000-memory.dmp vmprotect behavioral2/memory/4576-133-0x0000000010000000-0x000000001020B000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4576 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4576 4456 rundll32.exe 81 PID 4456 wrote to memory of 4576 4456 rundll32.exe 81 PID 4456 wrote to memory of 4576 4456 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f09860d04a653ddf387b9142bb14236ff16ab7db8d99b795a223f02c86604778.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f09860d04a653ddf387b9142bb14236ff16ab7db8d99b795a223f02c86604778.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4576
-