Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 10:09
Static task
static1
Behavioral task
behavioral1
Sample
31a196cb29cfe6310363e36f847c6ba1b740ee04617da9696f365c86c2e0d2e2.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
31a196cb29cfe6310363e36f847c6ba1b740ee04617da9696f365c86c2e0d2e2.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
31a196cb29cfe6310363e36f847c6ba1b740ee04617da9696f365c86c2e0d2e2.dll
-
Size
964KB
-
MD5
6d1353b8cce8b9ddd637b2f5822e1ae1
-
SHA1
d266c1741f0d1720e765a5fcb779f8235a6a6754
-
SHA256
31a196cb29cfe6310363e36f847c6ba1b740ee04617da9696f365c86c2e0d2e2
-
SHA512
f0c5ef843e459a038bc25f6edf6dd268b45761914d9d00dbeb17728a479d5d612c9a9757d3c14a6573f2d95a7a61b21423fb293c60aa36838860eaa4c9b0e9c4
-
SSDEEP
12288:N/AGHU8xDLIJcC5AhcVKMUsBl7xLCpEp9r:N/A+EJt52cxn7p9r
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1644 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a196cb29cfe6310363e36f847c6ba1b740ee04617da9696f365c86c2e0d2e2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a196cb29cfe6310363e36f847c6ba1b740ee04617da9696f365c86c2e0d2e2.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1644
-