Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2023, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
08867fc3b365d5588b8cfb16d6c430802a9cbd3edacaa4cea283b70552d7b1ea.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08867fc3b365d5588b8cfb16d6c430802a9cbd3edacaa4cea283b70552d7b1ea.dll
Resource
win10v2004-20230220-en
General
-
Target
08867fc3b365d5588b8cfb16d6c430802a9cbd3edacaa4cea283b70552d7b1ea.dll
-
Size
936KB
-
MD5
f8ddc22610f243aa3bc6a43b23101123
-
SHA1
1ce56ffc33536dda5497810b9663d255d70aee6b
-
SHA256
08867fc3b365d5588b8cfb16d6c430802a9cbd3edacaa4cea283b70552d7b1ea
-
SHA512
e7a73552bc58d5aac1c12e3e2ec44e808c324a4bd40d71e3b56c2c0cf37f8c3f4c21e6554fbe70974d59b5ee7b919ca5b39d59e4320ed89cdadfa24fa6d9aba1
-
SSDEEP
12288:uP4okynHXNoZCBodUzfzsTYkroq6dBU3UxCq4ysQnMaeg5Wyrl:uP4RyndACBaUzfziYsoD/pMa8yrl
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4432 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4432 2428 rundll32.exe 84 PID 2428 wrote to memory of 4432 2428 rundll32.exe 84 PID 2428 wrote to memory of 4432 2428 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08867fc3b365d5588b8cfb16d6c430802a9cbd3edacaa4cea283b70552d7b1ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08867fc3b365d5588b8cfb16d6c430802a9cbd3edacaa4cea283b70552d7b1ea.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4432
-