Analysis
-
max time kernel
88s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
42298da6fa04cdab7a36d16ca6e1c48b373c1faa8cdc5a206be3ddc402463f2a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
42298da6fa04cdab7a36d16ca6e1c48b373c1faa8cdc5a206be3ddc402463f2a.dll
Resource
win10v2004-20221111-en
General
-
Target
42298da6fa04cdab7a36d16ca6e1c48b373c1faa8cdc5a206be3ddc402463f2a.dll
-
Size
864KB
-
MD5
a7fc8c963692c06b10f4b80c6b1e6c96
-
SHA1
32c3dbd3610399dd0a9583c78cf1adf3faca43d4
-
SHA256
42298da6fa04cdab7a36d16ca6e1c48b373c1faa8cdc5a206be3ddc402463f2a
-
SHA512
7520a01b1534085d1330e38de1000445187876772f30b293da03efdd3df39ae62a3a7507ad23cff1767ef7499328fa225522ca12c2716b70db129a345fb2d915
-
SSDEEP
6144:ctsk41kXaGMOBHBmavA2Ugl8muDTuY40ocVWfGAvKAoowJ5sP3qEJDlEvnYOmMxn:yto1u0avA21uJATvY1JOVYYOLxl1
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4304 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4304 4976 rundll32.exe 82 PID 4976 wrote to memory of 4304 4976 rundll32.exe 82 PID 4976 wrote to memory of 4304 4976 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42298da6fa04cdab7a36d16ca6e1c48b373c1faa8cdc5a206be3ddc402463f2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42298da6fa04cdab7a36d16ca6e1c48b373c1faa8cdc5a206be3ddc402463f2a.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4304
-