Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
36c6870dc14aacac72ca17458e31578a658739b32e122484037b6f1db55d055c.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
36c6870dc14aacac72ca17458e31578a658739b32e122484037b6f1db55d055c.dll
Resource
win10v2004-20230915-en
General
-
Target
36c6870dc14aacac72ca17458e31578a658739b32e122484037b6f1db55d055c.dll
-
Size
928KB
-
MD5
93362a8936aa98e496d181df0298fc7a
-
SHA1
8461abf28f8d548449d478ea0becefa5664e9460
-
SHA256
36c6870dc14aacac72ca17458e31578a658739b32e122484037b6f1db55d055c
-
SHA512
57ecfe7de868326e48afbeae7ec8cdd396dd5395ba31eafabd0fdd8cb63af5c164ee2f54945fc9257b6c4e707e3517f9a441e0cac194097a6d0032dd7f79a6f0
-
SSDEEP
12288:2sj5QMu0ldn/Jx1OtTeMU1bLhhQ5nKz47o/uKjH4kvF7ERUm7x:2sj+MuednpM43h25K07ouKDBORH7x
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 904 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 904 3108 rundll32.exe 85 PID 3108 wrote to memory of 904 3108 rundll32.exe 85 PID 3108 wrote to memory of 904 3108 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\36c6870dc14aacac72ca17458e31578a658739b32e122484037b6f1db55d055c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\36c6870dc14aacac72ca17458e31578a658739b32e122484037b6f1db55d055c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:904
-