Analysis
-
max time kernel
206s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
7f5763d7ce5c05e010b412f99192acebbc484200fed75344ef61e4ba8c0dc496.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f5763d7ce5c05e010b412f99192acebbc484200fed75344ef61e4ba8c0dc496.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
7f5763d7ce5c05e010b412f99192acebbc484200fed75344ef61e4ba8c0dc496.dll
-
Size
59KB
-
MD5
e2574d1b7a9ced727cc9250b5e1d2cb0
-
SHA1
ff1bd2d7e9f80e4effdfd28224e14c17b317fcf6
-
SHA256
7f5763d7ce5c05e010b412f99192acebbc484200fed75344ef61e4ba8c0dc496
-
SHA512
a69508398d9cf77abf189f1aa515bf96ac414df5657ce67a6e6d367ff064e8abe14b0d4181f66c88dcad12fd225627dd813feae273ab8901ec31d2878067ae43
-
SSDEEP
1536:6ONP97egpJSc+PWdiXudDpW3WwqAEgDXjaWS9:l9esJSMFtI7zVan9
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tiyojula rundll32.exe File opened for modification C:\Windows\SysWOW64\vatanahi.dll rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5048 rundll32.exe 5048 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 768 wrote to memory of 5048 768 rundll32.exe 83 PID 768 wrote to memory of 5048 768 rundll32.exe 83 PID 768 wrote to memory of 5048 768 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5763d7ce5c05e010b412f99192acebbc484200fed75344ef61e4ba8c0dc496.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5763d7ce5c05e010b412f99192acebbc484200fed75344ef61e4ba8c0dc496.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5048
-