Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 17:04
Behavioral task
behavioral1
Sample
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll
Resource
win10v2004-20220812-en
General
-
Target
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll
-
Size
1.3MB
-
MD5
fd6524d388164ac9e454796177341d6a
-
SHA1
a81896aab990999cd9878ddbcc012d7a8343d212
-
SHA256
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7
-
SHA512
7308b7f31901a80bea0a93c414a277f5f62d936f068e549d70e0f64eb21654958de9c2573cec22182c84b277e74d37ee6fb90581fe160bbdfc288820abe6cebc
-
SSDEEP
24576:XY4ixXpFM0HdAB7l3C0FZhmftqsC2MTD4IkYNYCM8Yl2WVpT1qJ42xLFaRTqFL8Q:IThpFKBWssCZNY2zM2GVqFr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1396-56-0x0000000010000000-0x0000000010394000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SkinH_EL.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\SkinH_EL.dll rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1396 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1396
-