Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09507975f357a55a2820c8c56692af1f.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
09507975f357a55a2820c8c56692af1f.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
09507975f357a55a2820c8c56692af1f.dll
-
Size
663KB
-
MD5
09507975f357a55a2820c8c56692af1f
-
SHA1
4dd0ceaf3cdfc05292537605f96bfc40a417dbb3
-
SHA256
39ca97c0b289d8bd234d90afb3f5172465449a577bf353bc86331deb84a1753b
-
SHA512
41a0b1840fe7f414b4ee51c40ebb7b69f7a19a6d7ff2dbbdd43b6e793ab5eed83e2019bceb98efe8a7554aec3defb1a9611a7ac016d968cfb345516f25c12846
-
SSDEEP
12288:HjT6dVTOyBSTasouRwGtnJ/gnqf+ys4BTC6jQcQovnjTuZrDIHH7z7JB:Hj+dAysJhwMntn+yFTd/jqJyn7JB
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4712 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4712 1136 rundll32.exe 58 PID 1136 wrote to memory of 4712 1136 rundll32.exe 58 PID 1136 wrote to memory of 4712 1136 rundll32.exe 58
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09507975f357a55a2820c8c56692af1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09507975f357a55a2820c8c56692af1f.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4712
-