Analysis
-
max time kernel
178s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2690d44ea3b19395f3f88f2ef1bdb42c.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2690d44ea3b19395f3f88f2ef1bdb42c.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2690d44ea3b19395f3f88f2ef1bdb42c.dll
-
Size
9KB
-
MD5
2690d44ea3b19395f3f88f2ef1bdb42c
-
SHA1
29f707b8bf0159fffd6b75103c9ccfcce0030303
-
SHA256
5ff9bcc7782ce407905db9c5c96a0d45636b1adb73cc4fd55d3a6b824014ef52
-
SHA512
9e06d5e45f2abe81cf110a94811861e51b6d6808b96a22bf8c6910da8e7220a79239b300773e0ffa5edf06c6a1be0e68ac0b69dc71f759fa503ebe7c5840cbcb
-
SSDEEP
96:1apT99PQtSnFKhUY6kvTUbmee3fEW8r2Ctdd1Y4pXmEaflF4TWUe:1aP9It+cJDeQ9ZKWLb4TWUe
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4428 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4428 4776 rundll32.exe 77 PID 4776 wrote to memory of 4428 4776 rundll32.exe 77 PID 4776 wrote to memory of 4428 4776 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2690d44ea3b19395f3f88f2ef1bdb42c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2690d44ea3b19395f3f88f2ef1bdb42c.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4428
-