Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 21:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
049eed47f0867631b3ad6fd801236149.dll
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
049eed47f0867631b3ad6fd801236149.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
049eed47f0867631b3ad6fd801236149.dll
-
Size
315KB
-
MD5
049eed47f0867631b3ad6fd801236149
-
SHA1
05a52dac3aecc713eef3ff6a6290240de591b19c
-
SHA256
506fccd94de223f9f541c9ce31bfeac0a8b59f42494ea30b52044508598efca3
-
SHA512
2fb2b3aa98c5aa49d9d28f6b8a0f827604586bce2e8161a0f81292c2a552072415b3cae022c25bbe28452b57392ec9d99095707b50c2e30062a7984434a32e57
-
SSDEEP
6144:ndY3oD/WVWeLseK42CKtLoF6gBOICBsItvZtdst13idxwa+:ndYYgWeYeKkUnwpC2qZt0U9+
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3400 4908 rundll32.exe 69 PID 4908 wrote to memory of 3400 4908 rundll32.exe 69 PID 4908 wrote to memory of 3400 4908 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\049eed47f0867631b3ad6fd801236149.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\049eed47f0867631b3ad6fd801236149.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3400
-