Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
dbb8f306bbb7903c13600dfb81830c9515cc958443f440165b3862066d920117.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dbb8f306bbb7903c13600dfb81830c9515cc958443f440165b3862066d920117.dll
Resource
win10v2004-20220901-en
General
-
Target
dbb8f306bbb7903c13600dfb81830c9515cc958443f440165b3862066d920117.dll
-
Size
70KB
-
MD5
532211620d0320af270af8bd95a3e842
-
SHA1
f68c1bbc0963133fa715cf3ba72eb546823ba37f
-
SHA256
dbb8f306bbb7903c13600dfb81830c9515cc958443f440165b3862066d920117
-
SHA512
239f1a1f4df3c5447ece1560834a176fd85aa6a4859bdeee8798249644840f003db76b30608fc56629f26de65be6377ca68ba2d27ea0b7193f2ada86e4a753cb
-
SSDEEP
1536:pRlbsrY1bvynjnacr4S8plyB8LGLB6WCSeopkTE7IU6:9bsrSbazaRS8pE8LGLDC1oGTE7IR
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tajukifo.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\kasiyeho rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4880 rundll32.exe 4880 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4880 4984 rundll32.exe 81 PID 4984 wrote to memory of 4880 4984 rundll32.exe 81 PID 4984 wrote to memory of 4880 4984 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbb8f306bbb7903c13600dfb81830c9515cc958443f440165b3862066d920117.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbb8f306bbb7903c13600dfb81830c9515cc958443f440165b3862066d920117.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4880
-