Analysis
-
max time kernel
151s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 11:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4b23a906a8a82df3747f94fd60bb3c6972c4bdf43e64e6a25bab7e0a3755add9.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b23a906a8a82df3747f94fd60bb3c6972c4bdf43e64e6a25bab7e0a3755add9.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4b23a906a8a82df3747f94fd60bb3c6972c4bdf43e64e6a25bab7e0a3755add9.dll
-
Size
6.4MB
-
MD5
c423be438cdbc102a7984a33cd0ef27f
-
SHA1
e64b7c57343427a9aa4c301ab7f29b45cb77d1fa
-
SHA256
4b23a906a8a82df3747f94fd60bb3c6972c4bdf43e64e6a25bab7e0a3755add9
-
SHA512
46cdb4162fe176d9145635dd9a28f938e64b706d40e1d27fb6c2863127359af4179b143299fb2f6dacae802b88daf1e43919db566c60444dd91f4e12d6891186
-
SSDEEP
196608:nzLa5GjQ/fhqBd3gcWfqizHk2CIAT+/1M:Hjidfquk2+T+tM
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3996 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4352 wrote to memory of 3996 4352 rundll32.exe 83 PID 4352 wrote to memory of 3996 4352 rundll32.exe 83 PID 4352 wrote to memory of 3996 4352 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b23a906a8a82df3747f94fd60bb3c6972c4bdf43e64e6a25bab7e0a3755add9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b23a906a8a82df3747f94fd60bb3c6972c4bdf43e64e6a25bab7e0a3755add9.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3996
-