Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
65ab7ed9f2cb7d0146bd0ed63a66449fd7151a1ffccaf288f5119dc3c465f48b.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
65ab7ed9f2cb7d0146bd0ed63a66449fd7151a1ffccaf288f5119dc3c465f48b.dll
Resource
win10v2004-20230703-en
General
-
Target
65ab7ed9f2cb7d0146bd0ed63a66449fd7151a1ffccaf288f5119dc3c465f48b.dll
-
Size
788KB
-
MD5
76b8601efc71d7ab64980160ff4e6c30
-
SHA1
93983eb916183c891ef6c646cb6bf98a35349d97
-
SHA256
65ab7ed9f2cb7d0146bd0ed63a66449fd7151a1ffccaf288f5119dc3c465f48b
-
SHA512
a7e569905e85cdec8e2674884041489a3e0ed8ba551dda9629d470fd6aa282f4f20d2488b05b60051de38201b9acef89fcef37026033b48020c8a8ba8a57dd76
-
SSDEEP
6144:eLtXZrHXQCSK51KRCzyioKQT8WTiQ+A24cbqLurWxduUQ8xiwMeIm8iOkYH7fjSB:eLtxHNTwCzyint3QS/KxYgUeIZd4LwM
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4644 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4644 3248 rundll32.exe 83 PID 3248 wrote to memory of 4644 3248 rundll32.exe 83 PID 3248 wrote to memory of 4644 3248 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65ab7ed9f2cb7d0146bd0ed63a66449fd7151a1ffccaf288f5119dc3c465f48b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65ab7ed9f2cb7d0146bd0ed63a66449fd7151a1ffccaf288f5119dc3c465f48b.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4644
-