Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 03:17
Static task
static1
Behavioral task
behavioral1
Sample
736117fe02f8a8771c89df8b6d7cde021f04e1f966aa1dc78450e956ff8d8f69.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
736117fe02f8a8771c89df8b6d7cde021f04e1f966aa1dc78450e956ff8d8f69.dll
Resource
win10v2004-20230915-en
General
-
Target
736117fe02f8a8771c89df8b6d7cde021f04e1f966aa1dc78450e956ff8d8f69.dll
-
Size
589KB
-
MD5
44e7df9677030d7077878f84481c190f
-
SHA1
11b7dbd055ab6f45c9bf73451a33eb80323f5b8e
-
SHA256
736117fe02f8a8771c89df8b6d7cde021f04e1f966aa1dc78450e956ff8d8f69
-
SHA512
5fa49b8479363966fff1be56ab61a8705f4babfaa61ec7d32ea4d71d49632a365df804a0136d2c75b3e06b0175f7103d4b6be0ce687ccac793f87f9550ef1042
-
SSDEEP
12288:jn/DxEfpQ0zwJknLYQRs/kIJt+i+1PcePTUVstI/xFPvoDiCWqZj:bbxEfpDnLR9IJUiGhLxIDgGCWqZ
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 368 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 368 220 rundll32.exe 84 PID 220 wrote to memory of 368 220 rundll32.exe 84 PID 220 wrote to memory of 368 220 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\736117fe02f8a8771c89df8b6d7cde021f04e1f966aa1dc78450e956ff8d8f69.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\736117fe02f8a8771c89df8b6d7cde021f04e1f966aa1dc78450e956ff8d8f69.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:368
-