Analysis
-
max time kernel
162s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll
Resource
win10v2004-20221111-en
General
-
Target
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll
-
Size
41KB
-
MD5
7f85a94a52a0087f8828bf91e464c85f
-
SHA1
97d5f958ea212e675e67013bb51d64de2fb345ee
-
SHA256
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de
-
SHA512
08d6d97ffacdc8367856d9428bc232f115abf1fb65b3f2ce77388ab94f0ffb6690116d78ac031d7fedb1da2cdf9cd518243d93d00bc12477518788255e6105bd
-
SSDEEP
768:YsegFYETSTEfbqRqC2o6ABvUoODB8Pk1tTMRwwA:vFBNzq96ABvsBJyRwwA
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2044 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2044 5064 rundll32.exe 83 PID 5064 wrote to memory of 2044 5064 rundll32.exe 83 PID 5064 wrote to memory of 2044 5064 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2044
-