Analysis
-
max time kernel
35s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 03:52
Static task
static1
Behavioral task
behavioral1
Sample
f8010277bf71896e837ea03c77e0bfbf4687b25314aca6a1712cb2fb38eed11c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f8010277bf71896e837ea03c77e0bfbf4687b25314aca6a1712cb2fb38eed11c.dll
Resource
win10v2004-20221111-en
General
-
Target
f8010277bf71896e837ea03c77e0bfbf4687b25314aca6a1712cb2fb38eed11c.dll
-
Size
852KB
-
MD5
d429ac18bc6de295771db46753b796b0
-
SHA1
e9036d2090f78c8b28dc9de60d62df41599fc8e4
-
SHA256
f8010277bf71896e837ea03c77e0bfbf4687b25314aca6a1712cb2fb38eed11c
-
SHA512
a9e33d2822ad76c71d999dc023bfd1b82cf7e90681769923b052afa8add277c422deb7a88959f9d4495586320577a8485b76c618544858314c845376428d66d9
-
SSDEEP
12288:e/YjQ0DMi5IZLPxcwLTrDokePgvua7HsuF5a5TQQ5:e/YsCMD0iTnop4vp7HpSTQ6
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1548 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1548 1228 rundll32.exe 27 PID 1228 wrote to memory of 1548 1228 rundll32.exe 27 PID 1228 wrote to memory of 1548 1228 rundll32.exe 27 PID 1228 wrote to memory of 1548 1228 rundll32.exe 27 PID 1228 wrote to memory of 1548 1228 rundll32.exe 27 PID 1228 wrote to memory of 1548 1228 rundll32.exe 27 PID 1228 wrote to memory of 1548 1228 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8010277bf71896e837ea03c77e0bfbf4687b25314aca6a1712cb2fb38eed11c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8010277bf71896e837ea03c77e0bfbf4687b25314aca6a1712cb2fb38eed11c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1548
-