Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 02:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0009abc209a2a8b666a2bcddbdcb423e.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0009abc209a2a8b666a2bcddbdcb423e.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0009abc209a2a8b666a2bcddbdcb423e.dll
-
Size
100KB
-
MD5
0009abc209a2a8b666a2bcddbdcb423e
-
SHA1
e39b1952ccaacd84af0cb65c607d34ffa1c39825
-
SHA256
e18812f40d395e135d13fcf330ed634d9f7fa799268a43c5d52aca36dacaf08d
-
SHA512
fa104a7611c2b018fccc21058f7b7b91b255a27873d9118b28b92485c6bd91bb475a39b9d0f7ec1761e0f241b6d57414cb37e3424da66b15850afeb5ceef03a6
-
SSDEEP
1536:Dnys5590LogsjTKSH7E+tDSpx9hqBqF3KlBniV14b6:Dnym59Qogsa+tDSpfh1F3KlBni66
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5104 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3596 wrote to memory of 5104 3596 rundll32.exe 89 PID 3596 wrote to memory of 5104 3596 rundll32.exe 89 PID 3596 wrote to memory of 5104 3596 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0009abc209a2a8b666a2bcddbdcb423e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0009abc209a2a8b666a2bcddbdcb423e.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:5104
-