Analysis
-
max time kernel
125s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
8a23df3252a6e40287b68fbef750c8f7a86b9cfdf42247804f87cf94886000b6.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8a23df3252a6e40287b68fbef750c8f7a86b9cfdf42247804f87cf94886000b6.dll
Resource
win10v2004-20230703-en
General
-
Target
8a23df3252a6e40287b68fbef750c8f7a86b9cfdf42247804f87cf94886000b6.dll
-
Size
756KB
-
MD5
00c15c6c26934469f8c5a4dec99770f9
-
SHA1
ef44821ca30354a41c0f293e349d7dff3ad65dae
-
SHA256
8a23df3252a6e40287b68fbef750c8f7a86b9cfdf42247804f87cf94886000b6
-
SHA512
0c26c102c31345b5e4ba7e3fcbf7dcee495f8377f120c02411c1887846ab56b30eeaf7f37b6663f0435b0004866dcfed11fece61b445d74353089f4ccc1f5122
-
SSDEEP
6144:pW/ZAH3IBwbA+3upKnp5IYcYuO6OsWRSOgMWZcOSAsxhj/KyClB8vjvhesVTg:pWoYBwbAUuQBbLRngkYsz/za8LDdg
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4248 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4248 1636 rundll32.exe 80 PID 1636 wrote to memory of 4248 1636 rundll32.exe 80 PID 1636 wrote to memory of 4248 1636 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a23df3252a6e40287b68fbef750c8f7a86b9cfdf42247804f87cf94886000b6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a23df3252a6e40287b68fbef750c8f7a86b9cfdf42247804f87cf94886000b6.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4248
-