Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 17:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e8275a2aa8b77e930ee2e19274b0a38da8406dc3eab84eba6bb7ced606d4935.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e8275a2aa8b77e930ee2e19274b0a38da8406dc3eab84eba6bb7ced606d4935.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3e8275a2aa8b77e930ee2e19274b0a38da8406dc3eab84eba6bb7ced606d4935.dll
-
Size
3.4MB
-
MD5
a9e945edc0ffc8853114f9532133c8f9
-
SHA1
f381afb2427217d5021e30eed4df0ed36ca7f825
-
SHA256
3e8275a2aa8b77e930ee2e19274b0a38da8406dc3eab84eba6bb7ced606d4935
-
SHA512
ffdb9661f42d1e3d7a7b8493569859f4bb5c203de48e0b6de10983fbc43863a51a6812a96e6a2d9404a8855a3b13c7a7ccc1cf26e3e5bc062f762bff49d7edc6
-
SSDEEP
49152:hIl6J7cRhUaayV1h+2DM+XYDZqPsypr123:7cRSaayV1hPDM+Bp
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 236 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 236 4980 rundll32.exe 81 PID 4980 wrote to memory of 236 4980 rundll32.exe 81 PID 4980 wrote to memory of 236 4980 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e8275a2aa8b77e930ee2e19274b0a38da8406dc3eab84eba6bb7ced606d4935.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e8275a2aa8b77e930ee2e19274b0a38da8406dc3eab84eba6bb7ced606d4935.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:236
-