Analysis
-
max time kernel
62s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
00bbfc3ef12abbded0f521cb79cd183d.dll
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
00bbfc3ef12abbded0f521cb79cd183d.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
00bbfc3ef12abbded0f521cb79cd183d.dll
-
Size
7.1MB
-
MD5
00bbfc3ef12abbded0f521cb79cd183d
-
SHA1
2a969d91fb205c6e3b777cfc4a18dc4e4b3fb214
-
SHA256
d2b742ff313216772dc0826958eb7e89a0df8d2e12180b8dc2cc77224c65dc45
-
SHA512
575a9f43c92766a19d634a3f7a8ee5e2469b87697c3e5b94766c0c873c6b2666357b254522c33d4ee2e61e7f74381d18c192a4734809ff7b87d047c1146f16f3
-
SSDEEP
98304:Dd1m7PJGpbe9ouaJKkZVxtyNCnp3bGx9:DmkeOucVxxns
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4364 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 4364 744 rundll32.exe 91 PID 744 wrote to memory of 4364 744 rundll32.exe 91 PID 744 wrote to memory of 4364 744 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00bbfc3ef12abbded0f521cb79cd183d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00bbfc3ef12abbded0f521cb79cd183d.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4364 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:3288
-
-