Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
148a4e6b0e05d638dde3563b81822cefc567fa0d644b33cba3f4c03cf22db78c.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
148a4e6b0e05d638dde3563b81822cefc567fa0d644b33cba3f4c03cf22db78c.dll
Resource
win10v2004-20230220-en
General
-
Target
148a4e6b0e05d638dde3563b81822cefc567fa0d644b33cba3f4c03cf22db78c.dll
-
Size
1.0MB
-
MD5
def4b9c7ad3df60b01f594d3f80b68cc
-
SHA1
4fa803d3ab82d6c1369dcda312e08b8062542b0b
-
SHA256
148a4e6b0e05d638dde3563b81822cefc567fa0d644b33cba3f4c03cf22db78c
-
SHA512
5eb2363033320eba64578ab489bf6950b3a8df0e378c8ac3d8588b61d6dd502a24df47733934b20cd1569ac7df7ea3930407bc2007bad346a95579fb2a75bc54
-
SSDEEP
12288:qNmGWY9/qBAIIxjBEal16F2DM4VwM9hhfalHlpsR6lRLyfwST4b:qNmw9/KAIajBEa142HZtupsR6zyfwSm
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1396 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1396 1276 rundll32.exe 27 PID 1276 wrote to memory of 1396 1276 rundll32.exe 27 PID 1276 wrote to memory of 1396 1276 rundll32.exe 27 PID 1276 wrote to memory of 1396 1276 rundll32.exe 27 PID 1276 wrote to memory of 1396 1276 rundll32.exe 27 PID 1276 wrote to memory of 1396 1276 rundll32.exe 27 PID 1276 wrote to memory of 1396 1276 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\148a4e6b0e05d638dde3563b81822cefc567fa0d644b33cba3f4c03cf22db78c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\148a4e6b0e05d638dde3563b81822cefc567fa0d644b33cba3f4c03cf22db78c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1396
-