Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:03
Static task
static1
Behavioral task
behavioral1
Sample
0d6e69c54765cb6ca386c1e6f0055955.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d6e69c54765cb6ca386c1e6f0055955.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0d6e69c54765cb6ca386c1e6f0055955.dll
-
Size
30KB
-
MD5
0d6e69c54765cb6ca386c1e6f0055955
-
SHA1
39e5930471df1384f20ca572e5883052b264190b
-
SHA256
068ad49eb2b3da038f7bec2004816bed56ec2ec7b7e0b60669bf6733ed6a4753
-
SHA512
6bb548bab4d95635e6950b01554dd630e8202a1b1e8049d7abaccba7fab37115fa7659a8936de35810a751226c477987c718c88e73f2cf8dbaa19d5dc52d335f
-
SSDEEP
384:U2tXXA9hq92y1LUWlXFdikqo/+M+US3Y9CyZyqst5yOZ1EKPVFMzX0kCnYPLxeME:UaQhqMOlXGkWMhS3Ysy4qsAOZhdFOCX
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4204 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4204 1960 rundll32.exe 36 PID 1960 wrote to memory of 4204 1960 rundll32.exe 36 PID 1960 wrote to memory of 4204 1960 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d6e69c54765cb6ca386c1e6f0055955.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d6e69c54765cb6ca386c1e6f0055955.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4204
-