Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll
Resource
win10v2004-20220812-en
General
-
Target
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll
-
Size
308KB
-
MD5
9bf2eac3183086b2e6491bd518285a44
-
SHA1
73a8c1505546b7a656faac2de652c514e87e8ef1
-
SHA256
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d
-
SHA512
3dd743f3ec20647543287388e67fb38f9668547585f1199f084a1d4fdda08f87b97acc8917c0be6a2405fa929bc8405b983614e91af681512559ddf6509426ca
-
SSDEEP
6144:U6iPELHgnrHc0BNPEAIzclobAXdK0CBxCnouuoO85t0NyakXSDoKBVPK:U6Q8Hgzj2zQXdKnxDe0Qakd8K
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1344
-