Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 20:14
Static task
static1
Behavioral task
behavioral1
Sample
0acbe44eb775803d283b1d5057dfd63128445c8470415ca5bf318ba006df0ec1.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0acbe44eb775803d283b1d5057dfd63128445c8470415ca5bf318ba006df0ec1.dll
Resource
win10v2004-20230221-en
General
-
Target
0acbe44eb775803d283b1d5057dfd63128445c8470415ca5bf318ba006df0ec1.dll
-
Size
876KB
-
MD5
76dd7822bbe8b0371efb27405af6c5a0
-
SHA1
454a12e3e8ca4ea7fdf66637f5ab2bf37146ff3e
-
SHA256
0acbe44eb775803d283b1d5057dfd63128445c8470415ca5bf318ba006df0ec1
-
SHA512
e6789151211e959d648d4d85ae7d680175656b7ef61496d20c8589cce4a3634446417c69bef418f113c5ca44ae5e4cae19379613dbbe112245f68778f3eea30e
-
SSDEEP
12288:BF4h7HQQl8Ejw/KkDdo/noJ3rFSJViEd2j4:BFaQ48IwiOdooJrjnj4
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2500 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2500 2324 rundll32.exe 83 PID 2324 wrote to memory of 2500 2324 rundll32.exe 83 PID 2324 wrote to memory of 2500 2324 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0acbe44eb775803d283b1d5057dfd63128445c8470415ca5bf318ba006df0ec1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0acbe44eb775803d283b1d5057dfd63128445c8470415ca5bf318ba006df0ec1.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2500
-