Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-02-2023 04:47
Behavioral task
behavioral1
Sample
35d1192113012fecf7b0e908a4f923941c4f529175dbb690ce6ec4adfea6bea9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
35d1192113012fecf7b0e908a4f923941c4f529175dbb690ce6ec4adfea6bea9.dll
Resource
win10v2004-20220812-en
General
-
Target
35d1192113012fecf7b0e908a4f923941c4f529175dbb690ce6ec4adfea6bea9.dll
-
Size
437KB
-
MD5
601d1a8fd2efd5d524c36fddca3f64af
-
SHA1
96ef20d9e6b79c873fe367976b362f57c5feab4a
-
SHA256
35d1192113012fecf7b0e908a4f923941c4f529175dbb690ce6ec4adfea6bea9
-
SHA512
a1af010d193f1c82941005d47bf4a55d9b961e18ace062c4206a94cb60e1e3f15afb23df95afef2675a9d3835737004204485bf171c90c5d16a93ed8f7bd0f67
-
SSDEEP
6144:5oNPAqviXmC/r2ck6YaCBdX26Nu2NwA97YSOiWOpkTcc/y8rsGVaMZVk4CgOLPDo:6JSrynaCBQgF90cWVgPGVaM7HjOTM
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1712 rundll32.exe 1712 rundll32.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
rundll32.exepid process 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe PID 1208 wrote to memory of 1712 1208 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35d1192113012fecf7b0e908a4f923941c4f529175dbb690ce6ec4adfea6bea9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35d1192113012fecf7b0e908a4f923941c4f529175dbb690ce6ec4adfea6bea9.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1712
-