Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 17:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
303ce4de8227ce686174b2d1facca11d.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
303ce4de8227ce686174b2d1facca11d.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
303ce4de8227ce686174b2d1facca11d.dll
-
Size
310KB
-
MD5
303ce4de8227ce686174b2d1facca11d
-
SHA1
8d3cc41aa1284b39666aa9018f7e6808f52975f5
-
SHA256
c6d4427ed59e4ea370258387cdfc0431b58555a2d0ded459e3e3dd58ce3dbde7
-
SHA512
e8a112db66c31e38c4bff2bd3756e1a60e054909e702b7cc03a0a7ff7e5beeb97ba16c346d0fe967c159f0ec05b6f76739d93b5e93180c6a234c8470f40f0dd0
-
SSDEEP
6144:DT8RRLQ/WeMj6A1q/84RFRre9d1O43Ad+u7W//TC:DQRRLg/b/RCXQdLyW
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 5052 2596 rundll32.exe 90 PID 2596 wrote to memory of 5052 2596 rundll32.exe 90 PID 2596 wrote to memory of 5052 2596 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\303ce4de8227ce686174b2d1facca11d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\303ce4de8227ce686174b2d1facca11d.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:5052
-