Analysis
-
max time kernel
38s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
0b23a6caed39b814d874599683d8c9aeb64d4479d82ff3ddfdd07f12c4f2f5fe.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b23a6caed39b814d874599683d8c9aeb64d4479d82ff3ddfdd07f12c4f2f5fe.dll
Resource
win10v2004-20220901-en
General
-
Target
0b23a6caed39b814d874599683d8c9aeb64d4479d82ff3ddfdd07f12c4f2f5fe.dll
-
Size
872KB
-
MD5
0ff78f73f7b230e18f0a18f81c54f060
-
SHA1
bba0a40548683a46e9fc3b1b746061ab2468d020
-
SHA256
0b23a6caed39b814d874599683d8c9aeb64d4479d82ff3ddfdd07f12c4f2f5fe
-
SHA512
de2433ea971b58b539c49f17f6b2f48bd02dc0001cff724df9964415073eca83ac11728bf7011480a2f6f6c8e5cd92c1d3c275b8f6042892d3e994766bd4de4b
-
SSDEEP
12288:mTLTXeZ9T6vjVDUEx2wchHgugueZ/G3XuXLXzs:mT+fTWjVDUEx2wch55AG3ozzs
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1536 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b23a6caed39b814d874599683d8c9aeb64d4479d82ff3ddfdd07f12c4f2f5fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b23a6caed39b814d874599683d8c9aeb64d4479d82ff3ddfdd07f12c4f2f5fe.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1536
-