Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 08:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5ec76207fb792de60fe76644b53c2b37.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ec76207fb792de60fe76644b53c2b37.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5ec76207fb792de60fe76644b53c2b37.dll
-
Size
1008KB
-
MD5
5ec76207fb792de60fe76644b53c2b37
-
SHA1
48cfddd35dd82143c479103d2be49b4cdd5b74a8
-
SHA256
7e977aafbf904b02520b8cc465c794596d063fc2535590ce02e9000b5c506f92
-
SHA512
88949b32e716cac60098b7f25665e538f0714adfe49ac41f489555189ca67de2d646dc30be2d2faa5c757093be7e785329f9876ef6cf6c956898af201ecc164e
-
SSDEEP
24576:Bb8ium5Xd4VtEkVbsrvF5NptrkVMpyS5NptrkVMpyG2:eiuudypmvF5vtrkVML5vtrkVMD
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4440 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4440 4364 rundll32.exe 14 PID 4364 wrote to memory of 4440 4364 rundll32.exe 14 PID 4364 wrote to memory of 4440 4364 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ec76207fb792de60fe76644b53c2b37.dll,#11⤵
- Suspicious use of SetWindowsHookEx
PID:4440
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ec76207fb792de60fe76644b53c2b37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364