Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
070f27025fb79a6ef30671c7c3ccac5087923da2c6aa345202ca294cf73390c9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
070f27025fb79a6ef30671c7c3ccac5087923da2c6aa345202ca294cf73390c9.dll
Resource
win10v2004-20220812-en
General
-
Target
070f27025fb79a6ef30671c7c3ccac5087923da2c6aa345202ca294cf73390c9.dll
-
Size
307KB
-
MD5
28f59ea4a45bff94ba736550df7bdb70
-
SHA1
8a33058794d81ea88200d3e8c42aa488771eb994
-
SHA256
070f27025fb79a6ef30671c7c3ccac5087923da2c6aa345202ca294cf73390c9
-
SHA512
2595c2ccfecfe8b165406bd0d14a0dd7c5644887140c8531efa3eb27c1113cb40fbf41e83e9eb1b587100632e35e13f233816a24e902f5c80829b3a9070d2dcb
-
SSDEEP
6144:rQoaZHqQ1178R7Ce0QB24inoIBaImGw92/s04brjl8Z79kICHhH:rQhqSouQ84HIBaIfw9gaf8VqH
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3040 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3040 4088 rundll32.exe 78 PID 4088 wrote to memory of 3040 4088 rundll32.exe 78 PID 4088 wrote to memory of 3040 4088 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\070f27025fb79a6ef30671c7c3ccac5087923da2c6aa345202ca294cf73390c9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\070f27025fb79a6ef30671c7c3ccac5087923da2c6aa345202ca294cf73390c9.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3040
-