Analysis
-
max time kernel
176s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll
Resource
win10v2004-20221111-en
General
-
Target
ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll
-
Size
1.1MB
-
MD5
b2455595f313196d657d3fb3899aca06
-
SHA1
86a8417ea04ba510786e27f079e63e49c0bf75fa
-
SHA256
ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088
-
SHA512
9aed610603c0d2573ef67ddee1b3a9a626cf7fa12698ab0b598ed14a47b4cccaa32766257c1288cf48de124c54c5f8046350f2693057a4dbe01bdecfdec045cf
-
SSDEEP
24576:yk7LVvVwiBeriy7c2XJ8V7Qe0phLToByOMK+5vqI:tciBsiy7cIJ6kJphXoByOBI
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3304 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3304 4384 rundll32.exe 85 PID 4384 wrote to memory of 3304 4384 rundll32.exe 85 PID 4384 wrote to memory of 3304 4384 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3304
-