Analysis
-
max time kernel
51s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15-02-2023 14:03
Static task
static1
Behavioral task
behavioral1
Sample
t/SmadHook32.dll
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
t/Smadav.dat
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
t/Smadav.exe
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
t/setupres.dll
Resource
win10-20220901-en
General
-
Target
t/setupres.dll
-
Size
75KB
-
MD5
f1f9e9bd62292768f433c4f894eadb58
-
SHA1
835aac8aa29b747cd90d44b9fef5683bf0f1f6d9
-
SHA256
7863ad82f7e1c036e48e928433932177a14670033028b42f44dafeacb40a86a9
-
SHA512
e59b908e54d162abc2aa2d814b71d1ff62a4d2105d2f22df8e8371b760111de30ca6e4f77e14ccbc2ec49eba3ff1013d023edb9f72c89bada17eaf4558ca669c
-
SSDEEP
1536:71z1GbzJ50O6ZTVATfXqKtyoR5Lc+CQYsWjcdx6my+F:7tUvyAXqSdo6
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4544 wrote to memory of 3504 4544 rundll32.exe rundll32.exe PID 4544 wrote to memory of 3504 4544 rundll32.exe rundll32.exe PID 4544 wrote to memory of 3504 4544 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\t\setupres.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\t\setupres.dll,#12⤵PID:3504
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{FCC74B77-EC3E-4DD8-A80B-008A702075A9}1⤵PID:3488