Analysis
-
max time kernel
123s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 07:10 UTC
Static task
static1
Behavioral task
behavioral1
Sample
18b77bc45823601fb579f9afef1fd860629a195e2e40fdb4b36f97a508368178.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
18b77bc45823601fb579f9afef1fd860629a195e2e40fdb4b36f97a508368178.dll
Resource
win10v2004-20230703-en
General
-
Target
18b77bc45823601fb579f9afef1fd860629a195e2e40fdb4b36f97a508368178.dll
-
Size
980KB
-
MD5
ba716fca13ab1cd885d4f934da0a3d29
-
SHA1
e3b8f9db5e8384d14ddac7b3c423f5c9a4b3b229
-
SHA256
18b77bc45823601fb579f9afef1fd860629a195e2e40fdb4b36f97a508368178
-
SHA512
2f02ca2b5ac87bbe5e251ac257bb67cfc76b10502c9857dd45ff00ff3eaa078093a14f7c3d43881194bd241052c9b925427838f6eb41fe2badd5889772230e17
-
SSDEEP
12288:KnyKe3es5kY/fVjIp39I0Yqdoy06mjOu6tlL6E6J7ntPOG/ySFVmypVAbqHTF0vS:41s7kYHH0YqdO03tFO91OG/RFVmypxe
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4900 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1348 wrote to memory of 4900 1348 rundll32.exe 82 PID 1348 wrote to memory of 4900 1348 rundll32.exe 82 PID 1348 wrote to memory of 4900 1348 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18b77bc45823601fb579f9afef1fd860629a195e2e40fdb4b36f97a508368178.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18b77bc45823601fb579f9afef1fd860629a195e2e40fdb4b36f97a508368178.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4900
-
Network
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request108.211.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.81.21.72.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.254.224.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request169.117.168.52.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
74 B 145 B 1 1
DNS Request
108.211.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 142 B 1 1
DNS Request
240.81.21.72.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.254.224.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
169.117.168.52.in-addr.arpa