Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 07:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0f9f01260c0b49f7c9835eea5c5afd36c5e4a6a179e5f7698181187d2b96f6b0.dll
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f9f01260c0b49f7c9835eea5c5afd36c5e4a6a179e5f7698181187d2b96f6b0.dll
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
0f9f01260c0b49f7c9835eea5c5afd36c5e4a6a179e5f7698181187d2b96f6b0.dll
-
Size
1.1MB
-
MD5
401d77e99386063063aeb32f4a8754ab
-
SHA1
15a91098f9c2c3e1ec3d6f7838c343775be29277
-
SHA256
0f9f01260c0b49f7c9835eea5c5afd36c5e4a6a179e5f7698181187d2b96f6b0
-
SHA512
77f940d450c98359e45bd50a27041f689674a76d22b55e2e45d9a0bcafae4e6a5168c887717688eaf0fec7ffaae74eeb20b775450b5dbaff45f7de3274077f2a
-
SSDEEP
24576:dPLGco1rzbhsOZGqlDkjAjizGvf2jQrX0:dih5z2GGqxhOU22
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4752 4420 WerFault.exe 85 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4420 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4420 3176 rundll32.exe 85 PID 3176 wrote to memory of 4420 3176 rundll32.exe 85 PID 3176 wrote to memory of 4420 3176 rundll32.exe 85 PID 4420 wrote to memory of 4752 4420 rundll32.exe 88 PID 4420 wrote to memory of 4752 4420 rundll32.exe 88 PID 4420 wrote to memory of 4752 4420 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f9f01260c0b49f7c9835eea5c5afd36c5e4a6a179e5f7698181187d2b96f6b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f9f01260c0b49f7c9835eea5c5afd36c5e4a6a179e5f7698181187d2b96f6b0.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 6923⤵
- Program crash
PID:4752
-
-