Analysis
-
max time kernel
67s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 10:38
Static task
static1
Behavioral task
behavioral1
Sample
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll
Resource
win10v2004-20220812-en
General
-
Target
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll
-
Size
308KB
-
MD5
9bf2eac3183086b2e6491bd518285a44
-
SHA1
73a8c1505546b7a656faac2de652c514e87e8ef1
-
SHA256
a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d
-
SHA512
3dd743f3ec20647543287388e67fb38f9668547585f1199f084a1d4fdda08f87b97acc8917c0be6a2405fa929bc8405b983614e91af681512559ddf6509426ca
-
SSDEEP
6144:U6iPELHgnrHc0BNPEAIzclobAXdK0CBxCnouuoO85t0NyakXSDoKBVPK:U6Q8Hgzj2zQXdKnxDe0Qakd8K
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1824 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1824 2440 rundll32.exe 79 PID 2440 wrote to memory of 1824 2440 rundll32.exe 79 PID 2440 wrote to memory of 1824 2440 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0a0f246e98b7aba25537ce35ee375cbd80100db43663c4340c35ff0cc2cd50d.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1824
-