Analysis
-
max time kernel
20s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll
Resource
win10v2004-20220901-en
General
-
Target
849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll
-
Size
951KB
-
MD5
20feb83b592d5614b07b1f36ddce1110
-
SHA1
6e923c1c17138e046eb33a997818b3c76d016cf1
-
SHA256
849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c
-
SHA512
c48b42de573c43b1249a16a906d0c771a87f2b8c5b2d0f0cb02d59aae4981418ae469fac81d94ee2096a625b561b93795fc19bf7f6fe854cf460a449b6c16f29
-
SSDEEP
24576:lIhavuS5ZNdOaMZnPE9PXMcmklgCmcFgibBEk2YcEyB96:lVvdWaiiccTlwcu2EFYcD6
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1348 1640 rundll32.exe 27 PID 1640 wrote to memory of 1348 1640 rundll32.exe 27 PID 1640 wrote to memory of 1348 1640 rundll32.exe 27 PID 1640 wrote to memory of 1348 1640 rundll32.exe 27 PID 1640 wrote to memory of 1348 1640 rundll32.exe 27 PID 1640 wrote to memory of 1348 1640 rundll32.exe 27 PID 1640 wrote to memory of 1348 1640 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1348
-