Analysis
-
max time kernel
90s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
de67e92b1b197d232a9bce511bf3027a34cafac850045016d362ed1fe3f7cec3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de67e92b1b197d232a9bce511bf3027a34cafac850045016d362ed1fe3f7cec3.dll
Resource
win10v2004-20221111-en
General
-
Target
de67e92b1b197d232a9bce511bf3027a34cafac850045016d362ed1fe3f7cec3.dll
-
Size
764KB
-
MD5
b214648978ccada5580a5b609aadbef0
-
SHA1
a749a42aa325c167d7044776aee763245363666c
-
SHA256
de67e92b1b197d232a9bce511bf3027a34cafac850045016d362ed1fe3f7cec3
-
SHA512
a9736b47e834f77dee4a068f84d684edcd1b21ca5eb76c5362f890b617b9ba37acd248c41df21b4b89eddc352006282ccd5e2d62720aab2695473742cecc235a
-
SSDEEP
6144:RWxUb+NnbnLaHbwJeIGQy640fRq24oOMpssdUdDh/msIIHVd7qD3JL0QSjn0KvG:EuYnbnLa7wLJiMes+P/rLv7IFgga
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4680 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4680 4628 rundll32.exe 82 PID 4628 wrote to memory of 4680 4628 rundll32.exe 82 PID 4628 wrote to memory of 4680 4628 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de67e92b1b197d232a9bce511bf3027a34cafac850045016d362ed1fe3f7cec3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de67e92b1b197d232a9bce511bf3027a34cafac850045016d362ed1fe3f7cec3.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4680
-