Analysis
-
max time kernel
128s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 19:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1045989487b4eb717b32177a31669ed8a94c86c947ec8874cab222a797eefd37.dll
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
1045989487b4eb717b32177a31669ed8a94c86c947ec8874cab222a797eefd37.dll
-
Size
1.5MB
-
MD5
5eeb4891fdab9f26b654b3c1dacea86c
-
SHA1
f2c1ba3f5e0680e1f85d3c000dd9c3ff61f871b3
-
SHA256
1045989487b4eb717b32177a31669ed8a94c86c947ec8874cab222a797eefd37
-
SHA512
1d7dd48c2032489d7079b7da16dafe4f3cd47a95e13dcc851afc274646de3b3552fc277680158bb4c448cb66d153c52d4022acd3195a65350f8f23f5ba38b0db
-
SSDEEP
24576:M6OkXJwFj2qJT35zFLx3e5pv+85gE6y6tQuUTr9sokz6xllBZ1PUId7jBRsSpE+i:7StDT35hVqpvJ5oyXucrpdWkdWSpTgzV
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2036 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 2036 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe PID 1220 wrote to memory of 2036 1220 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1045989487b4eb717b32177a31669ed8a94c86c947ec8874cab222a797eefd37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1045989487b4eb717b32177a31669ed8a94c86c947ec8874cab222a797eefd37.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:2036