Analysis
-
max time kernel
173s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 06:52
Static task
static1
Behavioral task
behavioral1
Sample
a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll
Resource
win10v2004-20221111-en
General
-
Target
a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll
-
Size
68KB
-
MD5
0b2745544d7312cc003c9247f458b530
-
SHA1
484b11c027c4c82215b40d85eba7c1fb08fcb135
-
SHA256
a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647
-
SHA512
82cbb3e03261a962948844b8628c85d64afee5b101de0bbb99e6170c6acfafe2fa6596999e844c26fcd15b45bf6185a4f70c22c47f2a3b76fcbc4cb6c8496496
-
SSDEEP
1536:Gxjhju/TegrK+gi0w+GtvndJrHNxp3G567qz+/+4OG8Fjw+OY3:GRJu7XOMtPdJrHNreqm4hyhn
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\guwufeyi.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\vuditazi rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1472 rundll32.exe 1472 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 1472 3916 rundll32.exe 82 PID 3916 wrote to memory of 1472 3916 rundll32.exe 82 PID 3916 wrote to memory of 1472 3916 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1472
-