Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
d1fd5a60b524863c786ed55e16689121bd145e009c801cf520eeecf8c516b976.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d1fd5a60b524863c786ed55e16689121bd145e009c801cf520eeecf8c516b976.dll
Resource
win10v2004-20230915-en
General
-
Target
d1fd5a60b524863c786ed55e16689121bd145e009c801cf520eeecf8c516b976.dll
-
Size
836KB
-
MD5
9267bcd6c5f2a912baf6c5f4a39380b2
-
SHA1
c6a4f0e87b5acd20b88f7a23dea852d569f33778
-
SHA256
d1fd5a60b524863c786ed55e16689121bd145e009c801cf520eeecf8c516b976
-
SHA512
693b9ee8d5010de5553045bdaf38fa0b656577462117fd11ae87d06a3e99534a2cb70dc56dd00589e1174bc853e5528dc30134d2527d5503d90b8597983a211e
-
SSDEEP
12288:Lljx/Yen4goW1i4Uj1v5V1WD3je/CB6/AIiJdDaXs4XCoxMB9JE4j90S:JjWjGi4k1xV1aje/CI/AvdYs4SLBzjW
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2436 2220 rundll32.exe 29 PID 2220 wrote to memory of 2436 2220 rundll32.exe 29 PID 2220 wrote to memory of 2436 2220 rundll32.exe 29 PID 2220 wrote to memory of 2436 2220 rundll32.exe 29 PID 2220 wrote to memory of 2436 2220 rundll32.exe 29 PID 2220 wrote to memory of 2436 2220 rundll32.exe 29 PID 2220 wrote to memory of 2436 2220 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1fd5a60b524863c786ed55e16689121bd145e009c801cf520eeecf8c516b976.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1fd5a60b524863c786ed55e16689121bd145e009c801cf520eeecf8c516b976.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2436
-