Analysis
-
max time kernel
56s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d89aea9f518ca7f10c8953c8d96e0f3.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d89aea9f518ca7f10c8953c8d96e0f3.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0d89aea9f518ca7f10c8953c8d96e0f3.dll
-
Size
3.6MB
-
MD5
0d89aea9f518ca7f10c8953c8d96e0f3
-
SHA1
1a1833e2ddf136b6d87105765111e98566241da4
-
SHA256
0dfbfd5ffc2407580afee569af088ba1d0f5d44ac8fc4a4bb18b4481adf8a087
-
SHA512
c28e3afa4b2099089f323089ac9bba17390ee0f6ee5c04caccb6cdd0a5df0429aae71e1898733be14dfd5b54134289771b9a2794879e1c44dcf1631505616b69
-
SSDEEP
49152:wtiEM3qSat9+rZufjlxnyqxSgF8CP4rhDTF+2huh:wtT4ZurlL8CP4rh1+gu
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4832 3352 rundll32.exe 90 PID 3352 wrote to memory of 4832 3352 rundll32.exe 90 PID 3352 wrote to memory of 4832 3352 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d89aea9f518ca7f10c8953c8d96e0f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d89aea9f518ca7f10c8953c8d96e0f3.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4832 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2396
-
-