Analysis
-
max time kernel
128s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
18b30f3bceb281ea073ffa668a56ca8bc328b7ab01e4cedece3e3eb66214136e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18b30f3bceb281ea073ffa668a56ca8bc328b7ab01e4cedece3e3eb66214136e.dll
Resource
win10v2004-20231222-en
General
-
Target
18b30f3bceb281ea073ffa668a56ca8bc328b7ab01e4cedece3e3eb66214136e.dll
-
Size
968KB
-
MD5
d8d5a23fea07be98e316d53c906fd68c
-
SHA1
cc1b849d69a6b37e50d247a63fdfd9e31dff4b07
-
SHA256
18b30f3bceb281ea073ffa668a56ca8bc328b7ab01e4cedece3e3eb66214136e
-
SHA512
6b2c65ed2515a32ac71d5b2992d691790f692d11216c1fa639d1d1467d9c82f6aa53b31163a4e86d79751bda7f449d99f6315d3db221f79b64e7f5a8ccd0270e
-
SSDEEP
24576:YOQgOF2ikXc6bHpa7QhKspQ59VQFwqlSHCTchvCmUI04ylyPMvJQWZ1Wzx:rg6Fa7QhKspy
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 3 2968 rundll32.exe 7 2968 rundll32.exe 8 2968 rundll32.exe 9 2968 rundll32.exe 10 2968 rundll32.exe 11 2968 rundll32.exe 12 2968 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2968 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2968 2112 rundll32.exe 14 PID 2112 wrote to memory of 2968 2112 rundll32.exe 14 PID 2112 wrote to memory of 2968 2112 rundll32.exe 14 PID 2112 wrote to memory of 2968 2112 rundll32.exe 14 PID 2112 wrote to memory of 2968 2112 rundll32.exe 14 PID 2112 wrote to memory of 2968 2112 rundll32.exe 14 PID 2112 wrote to memory of 2968 2112 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18b30f3bceb281ea073ffa668a56ca8bc328b7ab01e4cedece3e3eb66214136e.dll,#11⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:2968
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18b30f3bceb281ea073ffa668a56ca8bc328b7ab01e4cedece3e3eb66214136e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2112