Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 06:50
Static task
static1
Behavioral task
behavioral1
Sample
f6b435252091c997fcdd2416eafa44f941341492bb9961113ac42ecd21342d3f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6b435252091c997fcdd2416eafa44f941341492bb9961113ac42ecd21342d3f.dll
Resource
win10v2004-20220812-en
General
-
Target
f6b435252091c997fcdd2416eafa44f941341492bb9961113ac42ecd21342d3f.dll
-
Size
68KB
-
MD5
b1df579b2ff11734cd38dee0d8e62640
-
SHA1
b72dce73f80a88316bb100b0bba35027cfdc67ce
-
SHA256
f6b435252091c997fcdd2416eafa44f941341492bb9961113ac42ecd21342d3f
-
SHA512
dc26879618514d4eed1b4d442702fa4e0ce2da387ac9c7ab6b5d968f9ef63662c784afc23fc7173b7a6c5d67ebbe685344efc01c5cedd52f758cc6ab2925a48d
-
SSDEEP
1536:HYuxCncAU3t9vmoJkYEvGxHdr3Hdof8p1K4FCXjUeDYciLuJzCR4:YDUrmoJkYoGDr3c8p190tDYfSzv
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zulagovi.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\javepemo rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 940 rundll32.exe 940 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1980 wrote to memory of 940 1980 rundll32.exe 28 PID 1980 wrote to memory of 940 1980 rundll32.exe 28 PID 1980 wrote to memory of 940 1980 rundll32.exe 28 PID 1980 wrote to memory of 940 1980 rundll32.exe 28 PID 1980 wrote to memory of 940 1980 rundll32.exe 28 PID 1980 wrote to memory of 940 1980 rundll32.exe 28 PID 1980 wrote to memory of 940 1980 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6b435252091c997fcdd2416eafa44f941341492bb9961113ac42ecd21342d3f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6b435252091c997fcdd2416eafa44f941341492bb9961113ac42ecd21342d3f.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:940
-