Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 02:22
Static task
static1
Behavioral task
behavioral1
Sample
8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll
Resource
win10v2004-20231023-en
General
-
Target
8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll
-
Size
3.0MB
-
MD5
b32ab8e562f848e707c81bd00d04bed8
-
SHA1
b03babef7344c4bb0ead84ae1fc7e256f0135d89
-
SHA256
8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1
-
SHA512
a3bb1a2fa5dc1eb2fe363a3ef9aadbf596e9b0f15560928e996a9df0dd00f8622074ebd29d4b292253bd0eac2b9165d9f097dcbbdb6ddf4881d0e4c93b62fe6b
-
SSDEEP
49152:2vYjpCOCQdLzdHxI5ByzNaHjHrG3Namlhv24rQX9xe:3VCOCgXdS4zuYTu8uP
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 316 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2880 wrote to memory of 316 2880 rundll32.exe 86 PID 2880 wrote to memory of 316 2880 rundll32.exe 86 PID 2880 wrote to memory of 316 2880 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:316
-