Analysis
-
max time kernel
32s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 09:29
Static task
static1
Behavioral task
behavioral1
Sample
73b603d1bd5d2c3fd83e8e6c0e46b75dc6b9da350e904ee1a4181474eed42717.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
73b603d1bd5d2c3fd83e8e6c0e46b75dc6b9da350e904ee1a4181474eed42717.dll
Resource
win10v2004-20220901-en
General
-
Target
73b603d1bd5d2c3fd83e8e6c0e46b75dc6b9da350e904ee1a4181474eed42717.dll
-
Size
360KB
-
MD5
eb2386a261c15dd28ff97b9dd8a6faa0
-
SHA1
ee735fa54f7a1e6e8d38b1c279ee3c9a5c6d17f7
-
SHA256
73b603d1bd5d2c3fd83e8e6c0e46b75dc6b9da350e904ee1a4181474eed42717
-
SHA512
33076bb4a705b69eed7dc94f3b56931de7780b90c11e610db45fd0eee02b220bafebba40240cfb5057e85ef622dc789c1ca6d6f73bd2e796a124758652e47e4b
-
SSDEEP
6144:WBMkUBCVRJwWnYonmVmM1VjDO2ff1bkbAGr5zlac4ogIC:WpiWnNmMGNSskkGr5z8c4Pr
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3660 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3660 2604 rundll32.exe 76 PID 2604 wrote to memory of 3660 2604 rundll32.exe 76 PID 2604 wrote to memory of 3660 2604 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73b603d1bd5d2c3fd83e8e6c0e46b75dc6b9da350e904ee1a4181474eed42717.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73b603d1bd5d2c3fd83e8e6c0e46b75dc6b9da350e904ee1a4181474eed42717.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3660
-