Analysis
-
max time kernel
94s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
9c3168a95ea668f756c781fcd4a0ffffa981dc485ec8a11ad86bbf70f642f358.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c3168a95ea668f756c781fcd4a0ffffa981dc485ec8a11ad86bbf70f642f358.dll
Resource
win10v2004-20220812-en
General
-
Target
9c3168a95ea668f756c781fcd4a0ffffa981dc485ec8a11ad86bbf70f642f358.dll
-
Size
230KB
-
MD5
b0cbb3a101bd1f0c7a0ac010efcb2cf0
-
SHA1
9109747b211500483492255e083c3ea027f266e7
-
SHA256
9c3168a95ea668f756c781fcd4a0ffffa981dc485ec8a11ad86bbf70f642f358
-
SHA512
34d3c8da4aa1884425fb87fe339094ccac0852e938432abe64695dce450dc6803b5f5a2dd2d4d5f07faea88a17ec05837d9394ba304eaa2d8b7f629b30de5047
-
SSDEEP
6144:zRjmOBosWDXLIiElVdF15L5LQsd7/ym+E8oo4f3XYr3:dJBDuXLIi2nl5Tyo+4f3X43
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1604-133-0x0000000010000000-0x00000000100A8000-memory.dmp upx behavioral2/memory/1604-134-0x0000000010000000-0x00000000100A8000-memory.dmp upx behavioral2/memory/1604-135-0x0000000010000000-0x00000000100A8000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1604 4260 rundll32.exe 80 PID 4260 wrote to memory of 1604 4260 rundll32.exe 80 PID 4260 wrote to memory of 1604 4260 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c3168a95ea668f756c781fcd4a0ffffa981dc485ec8a11ad86bbf70f642f358.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c3168a95ea668f756c781fcd4a0ffffa981dc485ec8a11ad86bbf70f642f358.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1604
-