Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1cfcc68f313331b120ec391a262deaf5.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cfcc68f313331b120ec391a262deaf5.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
1cfcc68f313331b120ec391a262deaf5.dll
-
Size
40KB
-
MD5
1cfcc68f313331b120ec391a262deaf5
-
SHA1
e75a4ca9fc1573d6747764db22555ea495d1aed7
-
SHA256
9335c7bff1b69b270eebd79919d30499878a7c89a544d12eb86b1b085f621a4a
-
SHA512
e2d2458edd77199aeb1e89a7c9b9a61500e64e8ee7f926a146715ee1c2c5ef9247c7861d02ed94c453ad0817ca8730bcc18a2109b459d0e66e518fbc79127d4a
-
SSDEEP
768:7kGvWguF++X1DHLqpz/fKVo9KyOuE4hUgoZWq+zY2:7DAF++XRHL+KVo9Kyp5s+zF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4264 rundll32.exe 4264 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4264 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4264 4024 rundll32.exe 17 PID 4024 wrote to memory of 4264 4024 rundll32.exe 17 PID 4024 wrote to memory of 4264 4024 rundll32.exe 17
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1cfcc68f313331b120ec391a262deaf5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1cfcc68f313331b120ec391a262deaf5.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4264
-