Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
2828ff9171b542358e92f68b53c583b41dd586eed7e57f03cc4c004ad2b896cd.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2828ff9171b542358e92f68b53c583b41dd586eed7e57f03cc4c004ad2b896cd.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
2828ff9171b542358e92f68b53c583b41dd586eed7e57f03cc4c004ad2b896cd.dll
-
Size
1.6MB
-
MD5
d6a2b278eb2a3c093552f98677019ef2
-
SHA1
2ca639780d76bfdf15ac9be89b006fb36c11f7a7
-
SHA256
2828ff9171b542358e92f68b53c583b41dd586eed7e57f03cc4c004ad2b896cd
-
SHA512
942c72576930974493b190726432d51d37c87e07255abd1ff37a0ce8f208118419d9e88ab0f3513777aaaef000c6d67a4569ad58ac7851c2c133d83c7eca33ff
-
SSDEEP
49152:GRrTFjXXl/q+s8KuqGaX0ToIBAUZLYL8G:orTJXXd5JBAUZL
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1080 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1080 3712 rundll32.exe 78 PID 3712 wrote to memory of 1080 3712 rundll32.exe 78 PID 3712 wrote to memory of 1080 3712 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2828ff9171b542358e92f68b53c583b41dd586eed7e57f03cc4c004ad2b896cd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2828ff9171b542358e92f68b53c583b41dd586eed7e57f03cc4c004ad2b896cd.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1080
-