Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:35
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
01e698fee8f651902bceb7a5fff6fa53.dll
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
01e698fee8f651902bceb7a5fff6fa53.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
01e698fee8f651902bceb7a5fff6fa53.dll
-
Size
24KB
-
MD5
01e698fee8f651902bceb7a5fff6fa53
-
SHA1
b13e86e5f5058bf3a533e41b5aa6f3ebf12af78c
-
SHA256
40449a409af17f1fde67e7972bbbfe4c0cd78a8e54e3425310c58370c2b3d1f2
-
SHA512
a12c9a1a2b7b4533caec667f085b7f4b5e88c372d4b78ce590025762346fd9bb510d758b1d07870540886742e9e0b8d51584b88e33b87b320695e85a569fda2e
-
SSDEEP
768:ANRSAeRJIRAe8oF1GYLJQF+Kcbk5CcCfKSuhRyzNl:ANITwn1GYLdtg5MNl
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Pro\ime\Bestkg.htm rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1676 rundll32.exe 1676 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1676 1680 rundll32.exe 14 PID 1680 wrote to memory of 1676 1680 rundll32.exe 14 PID 1680 wrote to memory of 1676 1680 rundll32.exe 14 PID 1680 wrote to memory of 1676 1680 rundll32.exe 14 PID 1680 wrote to memory of 1676 1680 rundll32.exe 14 PID 1680 wrote to memory of 1676 1680 rundll32.exe 14 PID 1680 wrote to memory of 1676 1680 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01e698fee8f651902bceb7a5fff6fa53.dll,#11⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1676
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01e698fee8f651902bceb7a5fff6fa53.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680