Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b8f1fccea14ecd648a9014eb6fec775.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b8f1fccea14ecd648a9014eb6fec775.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1b8f1fccea14ecd648a9014eb6fec775.dll
-
Size
79KB
-
MD5
1b8f1fccea14ecd648a9014eb6fec775
-
SHA1
116fb3cca5c35d7eb32a1c42916776b0b660773b
-
SHA256
eaf6b0aac21cfe73817df8b18c9229f2a0588daa2667c2c0cf11116e278047df
-
SHA512
a4ee25ed17522d22b28b24998766ec7dbd66dd333e3080ad55a925ce0b4c2727ad9bfcff2d4273d5e4f13c3f434e26768c90eb9facd607f23bef821f68905b79
-
SSDEEP
1536:gzARXC49/NmjfOzatoOFRRMK2f4fowc3r51+bbAsvjxGS:lSIkbjRMK2fWowOrMtLcS
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3364 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3364 4480 rundll32.exe 89 PID 4480 wrote to memory of 3364 4480 rundll32.exe 89 PID 4480 wrote to memory of 3364 4480 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b8f1fccea14ecd648a9014eb6fec775.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b8f1fccea14ecd648a9014eb6fec775.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3364
-