Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 05:33
Static task
static1
Behavioral task
behavioral1
Sample
41cc1592a9b4bd0b50a290e15f85fd19d5119a49a85272b8c741facdc8cdaa12.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41cc1592a9b4bd0b50a290e15f85fd19d5119a49a85272b8c741facdc8cdaa12.dll
Resource
win10v2004-20220812-en
General
-
Target
41cc1592a9b4bd0b50a290e15f85fd19d5119a49a85272b8c741facdc8cdaa12.dll
-
Size
144KB
-
MD5
f783037d8df75b2d11e822c39a5e1110
-
SHA1
af80f9b115798dbb31439dcf04a18681e78a5a0c
-
SHA256
41cc1592a9b4bd0b50a290e15f85fd19d5119a49a85272b8c741facdc8cdaa12
-
SHA512
c555483f6ae37260a554a9018e731b247c3d24788c6d93948a4ea74cd45b8d51571cdfb129cc16d2f670352a97ffb809a79ae9073d9a50f83c5eb2063c73c1e8
-
SSDEEP
1536:NRKY1hcJaw1zO4Hs8UIPSt1/3THtOjJmTNHli5OewLp5JEw1e:9QL1zOus8UIPSb/3ztOj0TNFJeEEMe
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1384 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1384 1112 rundll32.exe 26 PID 1112 wrote to memory of 1384 1112 rundll32.exe 26 PID 1112 wrote to memory of 1384 1112 rundll32.exe 26 PID 1112 wrote to memory of 1384 1112 rundll32.exe 26 PID 1112 wrote to memory of 1384 1112 rundll32.exe 26 PID 1112 wrote to memory of 1384 1112 rundll32.exe 26 PID 1112 wrote to memory of 1384 1112 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41cc1592a9b4bd0b50a290e15f85fd19d5119a49a85272b8c741facdc8cdaa12.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41cc1592a9b4bd0b50a290e15f85fd19d5119a49a85272b8c741facdc8cdaa12.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1384
-