Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 05:29
Static task
static1
Behavioral task
behavioral1
Sample
f07315c6ba8aea9102e183c3b16b39ef470b060cad87e3d8be6c87ba5e99173c.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f07315c6ba8aea9102e183c3b16b39ef470b060cad87e3d8be6c87ba5e99173c.dll
Resource
win10v2004-20230703-en
General
-
Target
f07315c6ba8aea9102e183c3b16b39ef470b060cad87e3d8be6c87ba5e99173c.dll
-
Size
715KB
-
MD5
0f91790b26746ab661490e8a07e1b85c
-
SHA1
9329fe1da690a1427711baf5727a237f5c77435f
-
SHA256
f07315c6ba8aea9102e183c3b16b39ef470b060cad87e3d8be6c87ba5e99173c
-
SHA512
8b538bfa47d9383fa6c6c73f9f01834543b4cad72c7fa191dd3a979165fb32068e952ebef5e2c0024279a4527069a8aaabfb43d87f29f68e445fca3b691ba7af
-
SSDEEP
12288:T2FNaVEUJhbMqBnhpoLjUx29rhta/FWxQ4SGKehmJboPFzWbI1tZOP0:KFNaVZbZhpA+29Da/gNfeb4tf
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2428 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3180 wrote to memory of 2428 3180 rundll32.exe 81 PID 3180 wrote to memory of 2428 3180 rundll32.exe 81 PID 3180 wrote to memory of 2428 3180 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f07315c6ba8aea9102e183c3b16b39ef470b060cad87e3d8be6c87ba5e99173c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f07315c6ba8aea9102e183c3b16b39ef470b060cad87e3d8be6c87ba5e99173c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2428
-