Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31-08-2023 21:31
Static task
static1
Behavioral task
behavioral1
Sample
030fd989d6fa4f51db433e7227d81885c230b40d446ee4c9f80f936ba68933f0.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
030fd989d6fa4f51db433e7227d81885c230b40d446ee4c9f80f936ba68933f0.dll
Resource
win10v2004-20230703-en
General
-
Target
030fd989d6fa4f51db433e7227d81885c230b40d446ee4c9f80f936ba68933f0.dll
-
Size
1.2MB
-
MD5
a3cb9cec091a5acd0bf9e180ae48e59c
-
SHA1
35c5dfa1916e8a04e1b1d04171b2939a93704c48
-
SHA256
030fd989d6fa4f51db433e7227d81885c230b40d446ee4c9f80f936ba68933f0
-
SHA512
424de1ca13f2595b3d53b4bb56b4ca588a76c30e04aedfad4382d14222d972efb0c3b6abd0acd40fb3e4aa5cb5e0412cd120f9e903653f19c74a8544d36b704d
-
SSDEEP
24576:dyKg8uOS/RJqs6gZy72PvfEUdsxbYgzm1p93MCpU4w3dbSXDiBGHs8PD4KgXvFzh:d9S/Dqs6gZySXcKwbYgzm1p9R6bEzVM5
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 880 wrote to memory of 1672 880 rundll32.exe 28 PID 880 wrote to memory of 1672 880 rundll32.exe 28 PID 880 wrote to memory of 1672 880 rundll32.exe 28 PID 880 wrote to memory of 1672 880 rundll32.exe 28 PID 880 wrote to memory of 1672 880 rundll32.exe 28 PID 880 wrote to memory of 1672 880 rundll32.exe 28 PID 880 wrote to memory of 1672 880 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\030fd989d6fa4f51db433e7227d81885c230b40d446ee4c9f80f936ba68933f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\030fd989d6fa4f51db433e7227d81885c230b40d446ee4c9f80f936ba68933f0.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1672
-