Analysis
-
max time kernel
151s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2199577af9c4c5e3475784dc2e60af6a.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2199577af9c4c5e3475784dc2e60af6a.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2199577af9c4c5e3475784dc2e60af6a.dll
-
Size
85KB
-
MD5
2199577af9c4c5e3475784dc2e60af6a
-
SHA1
fe38b69c7cb01fd726837636e18049d9831dd156
-
SHA256
9fdd57539a0ef4f7cbdde6057dca711f466779d4e32ba3493d945b6ad2e26f51
-
SHA512
d60793a8b468c8885c053f1aeeca5df7db38df29d6a6e20842b729bda6b6c7c19bee76e7406c1a469b35e8efba3b357c372f8cacf468ca8d36312ee47d8f04db
-
SSDEEP
1536:t5Zd1CG33MD2mmg29+2Oa0OYziAha31N2cqHk5LVxxqpQjYw44A7wcRAP5i7Di1x:93Bn/R9+jYY7+wHmxxQMYw44AscRs29y
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1708 2068 rundll32.exe 90 PID 2068 wrote to memory of 1708 2068 rundll32.exe 90 PID 2068 wrote to memory of 1708 2068 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2199577af9c4c5e3475784dc2e60af6a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2199577af9c4c5e3475784dc2e60af6a.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1708
-