Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2023 23:05
Behavioral task
behavioral1
Sample
CLibrary.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
600 seconds
Behavioral task
behavioral2
Sample
injector.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
20 signatures
600 seconds
General
-
Target
CLibrary.dll
-
Size
18KB
-
MD5
379358b4cd4b60137c0807f327531987
-
SHA1
b0a5f6e3dcd0dbc94726f16ed55d2461d1737b59
-
SHA256
0ff1d03926f5d9c01d02fae5c5e1f018a87d7f90a1826de47277530bfc7776f8
-
SHA512
097c08135d654596a19ada814ad360a8c2374d989cbd7094c6acb092e9854abf1f1d878d3da72b66c4c75806586bee7fe04d555a1d82db170725bdbeadea7d50
-
SSDEEP
384:rLyPunoshzdtnbuH0aXOk0GfZh5g+zCxU:rLy7s5dJuHHOqhyy
Score
1/10
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4680 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4680 4808 rundll32.exe 84 PID 4808 wrote to memory of 4680 4808 rundll32.exe 84 PID 4808 wrote to memory of 4680 4808 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CLibrary.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CLibrary.dll,#12⤵
- Suspicious use of FindShellTrayWindow
PID:4680
-