Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
30b8d645cdf2466355709620d7184f7eec104a51cc595f5a8a79988556077f18.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
30b8d645cdf2466355709620d7184f7eec104a51cc595f5a8a79988556077f18.dll
Resource
win10v2004-20231023-en
General
-
Target
30b8d645cdf2466355709620d7184f7eec104a51cc595f5a8a79988556077f18.dll
-
Size
15.9MB
-
MD5
608b469cf4060dc5a4791ee667166c7f
-
SHA1
f03c39c1913695b7d8c6834735943a57a053ceb1
-
SHA256
30b8d645cdf2466355709620d7184f7eec104a51cc595f5a8a79988556077f18
-
SHA512
498ddfddcc3f89587fd84aaf383bce193b906c8b6b2a723ee945da19c7c4aa3231286b0420275a74429a7a399f6d9c3ce640b1316b637eae13b035666d759ed0
-
SSDEEP
196608:fpADWHhPU4LMsNo+7D8EzqnD6m5QYSdq1BnqUT4gWSkd/uN/jBnxQBbP39I2bvIR:fpBhe4gW3dK1nxQDwuWJzBeZY
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4644 rundll32.exe 4644 rundll32.exe 4644 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 376 wrote to memory of 4644 376 rundll32.exe 17 PID 376 wrote to memory of 4644 376 rundll32.exe 17 PID 376 wrote to memory of 4644 376 rundll32.exe 17
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30b8d645cdf2466355709620d7184f7eec104a51cc595f5a8a79988556077f18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30b8d645cdf2466355709620d7184f7eec104a51cc595f5a8a79988556077f18.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4644
-