Analysis
-
max time kernel
25s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
a282e6ca4ef20c8dcaafbf4a9a7b0eff12f1952747957afbdc2921fe4859a6a7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a282e6ca4ef20c8dcaafbf4a9a7b0eff12f1952747957afbdc2921fe4859a6a7.dll
Resource
win10v2004-20220901-en
General
-
Target
a282e6ca4ef20c8dcaafbf4a9a7b0eff12f1952747957afbdc2921fe4859a6a7.dll
-
Size
142KB
-
MD5
50f6c9b0cc7cb5e61ccb61f366b7979b
-
SHA1
6ee73dfee6bf81bbe711fb22644be608825d10c4
-
SHA256
a282e6ca4ef20c8dcaafbf4a9a7b0eff12f1952747957afbdc2921fe4859a6a7
-
SHA512
a07b76d5e8809a8ffe730e6ad18bc2eabc8a854dde53c8565dad4354840372ae72b782e7f473de6e3c6d455ca16955ccfc209d235efc1d03f1c882f4a294ed46
-
SSDEEP
3072:PnFaoO8wAH3+/ttmPO+cxvvLX6GqrsYmHhNBadZM:PF73+ly5cVz6Gqr3mBNi
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ernel32.dll rundll32.exe File created C:\Windows\SysWOW64\ernel32.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1776 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1776 1780 rundll32.exe 28 PID 1780 wrote to memory of 1776 1780 rundll32.exe 28 PID 1780 wrote to memory of 1776 1780 rundll32.exe 28 PID 1780 wrote to memory of 1776 1780 rundll32.exe 28 PID 1780 wrote to memory of 1776 1780 rundll32.exe 28 PID 1780 wrote to memory of 1776 1780 rundll32.exe 28 PID 1780 wrote to memory of 1776 1780 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a282e6ca4ef20c8dcaafbf4a9a7b0eff12f1952747957afbdc2921fe4859a6a7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a282e6ca4ef20c8dcaafbf4a9a7b0eff12f1952747957afbdc2921fe4859a6a7.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776
-