Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5f17cd69a197a2be968dd1f13ccee737.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5f17cd69a197a2be968dd1f13ccee737.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
5f17cd69a197a2be968dd1f13ccee737.dll
-
Size
59KB
-
MD5
5f17cd69a197a2be968dd1f13ccee737
-
SHA1
5b7504c053fb6cfb111912ae6c22a51701fbc606
-
SHA256
3e02fc1a2195fd1f8b3eec0ac5b7052d88966e140f035784ac12b72ace31ec6e
-
SHA512
2de67ef2b8875ea6dc7dfd42d9d66c02dde37fcf9eddb9aa51c3032cbe6f829149b67aea1c8e52c4f07c00e8a04a994dd845a73db4ebc0a441ba96654218427a
-
SSDEEP
1536:6ONP97egpJSc+PWdiXudDpW3WwqAEgDXjaWSb2:l9esJSMFtI7zVana
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nazuwedu.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\nonugomu rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3424 rundll32.exe 3424 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4624 wrote to memory of 3424 4624 rundll32.exe 87 PID 4624 wrote to memory of 3424 4624 rundll32.exe 87 PID 4624 wrote to memory of 3424 4624 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f17cd69a197a2be968dd1f13ccee737.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f17cd69a197a2be968dd1f13ccee737.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3424
-