Analysis
-
max time kernel
1495s -
max time network
1587s -
platform
windows10-1703_x64 -
resource
win10-20220812-es -
resource tags
arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
01-02-2023 23:41
Static task
static1
Behavioral task
behavioral1
Sample
Halo h.zip
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
Halo h/Loader.exe
Resource
win10-20220812-es
Behavioral task
behavioral3
Sample
Halo h/Settings.ini
Resource
win10-20220812-es
Behavioral task
behavioral4
Sample
Halo h/bin/HaloCE Multihack.dll
Resource
win10-20220901-es
Behavioral task
behavioral5
Sample
Halo h/bin/HaloPC Multihack.dll
Resource
win10-20220812-es
Behavioral task
behavioral6
Sample
Halo h/bin/ttnlog.txt
Resource
win10-20220812-es
General
-
Target
Halo h/bin/HaloPC Multihack.dll
-
Size
43KB
-
MD5
b31dcfd0f7d2ced3547038100dc1cf90
-
SHA1
5ffd07c2bbcf10725e1d38f55843ccf18526bc2d
-
SHA256
c4cd035f2a8e65a8f3a8d5e968e9854bafefd3a2cc7b959d4178da9c977e32cb
-
SHA512
0442a7d6356404176c552b006d95a0bdb92654e31a1a54403978c4ec9f9d1231b019a1d8bd18b2ba48dd5f46a26d225571265633d7b162e28186c5d1104ec9f2
-
SSDEEP
768:efhS5AwGs8jSKbqTpjHnNVhQ/biGequ3lSG5qTbdYUOf7O+Uz47q:yY5AwGxbq9NVjqu1SGoKUOfkz47q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4040 4676 rundll32.exe 67 PID 4676 wrote to memory of 4040 4676 rundll32.exe 67 PID 4676 wrote to memory of 4040 4676 rundll32.exe 67
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Halo h\bin\HaloPC Multihack.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Halo h\bin\HaloPC Multihack.dll",#12⤵PID:4040
-