Analysis
-
max time kernel
184s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
8647b7efc306589127e2979ccf7ce9d43f74d5d863e88a913b4798901585ba79.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8647b7efc306589127e2979ccf7ce9d43f74d5d863e88a913b4798901585ba79.dll
Resource
win10v2004-20220812-en
General
-
Target
8647b7efc306589127e2979ccf7ce9d43f74d5d863e88a913b4798901585ba79.dll
-
Size
67KB
-
MD5
b2603dbbdd6d50fb5aa9ce63a53165a3
-
SHA1
2ea16fc1033a7a79b88e5fcc86a29cbe1225c9b7
-
SHA256
8647b7efc306589127e2979ccf7ce9d43f74d5d863e88a913b4798901585ba79
-
SHA512
865f0e35ce552a95c3068b5dd3e77b48b8d5cb2ae5e257b45f10723af49ea0c25b294795c7701c295e4963d1eece82530c6381c9a18abed3e0007fe28084db06
-
SSDEEP
1536:GviL32OeZMyUZE+YBW9wUrySKy8J4uueWTrymlqSkFsZSaVUhqc:8iLGHM8hBW9wUWZRueWKmASkkFUh5
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3672 rundll32.exe 3672 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3672 4192 rundll32.exe 80 PID 4192 wrote to memory of 3672 4192 rundll32.exe 80 PID 4192 wrote to memory of 3672 4192 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8647b7efc306589127e2979ccf7ce9d43f74d5d863e88a913b4798901585ba79.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8647b7efc306589127e2979ccf7ce9d43f74d5d863e88a913b4798901585ba79.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3672
-