Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 18:48
Behavioral task
behavioral1
Sample
40ee780bd009de0bac4ca96669dd68cd1295fc2372fccce377e36e270e220eab.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
40ee780bd009de0bac4ca96669dd68cd1295fc2372fccce377e36e270e220eab.dll
Resource
win10v2004-20230220-en
General
-
Target
40ee780bd009de0bac4ca96669dd68cd1295fc2372fccce377e36e270e220eab.dll
-
Size
3.0MB
-
MD5
d733d53f95277a5e99f97d26d76b7307
-
SHA1
075ab76e425d96eb4d5a4c0cebd5c418c67f5d46
-
SHA256
40ee780bd009de0bac4ca96669dd68cd1295fc2372fccce377e36e270e220eab
-
SHA512
c4270a154ec49d06d7e297c04da034b0e71f6aa30396f3ce79e68b8c0d6ee82e9c4868fde8fd5f5e6b96936ae18451041d3ee741ccedcbf668a48fd242a94d23
-
SSDEEP
49152:+AtvlOStdLzdHxI5ByzNaHjHvCFf0dI0H8U/04HbWa6k/r6LT/3:DllOSTXdS4zRdXU/Hy3kz6LT/
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1312-54-0x0000000010000000-0x000000001034E000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1312 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe PID 1408 wrote to memory of 1312 1408 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ee780bd009de0bac4ca96669dd68cd1295fc2372fccce377e36e270e220eab.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ee780bd009de0bac4ca96669dd68cd1295fc2372fccce377e36e270e220eab.dll,#12⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1312-54-0x0000000010000000-0x000000001034E000-memory.dmpFilesize
3.3MB