Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
5449048771dcc1fac8f027267b01aa59.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5449048771dcc1fac8f027267b01aa59.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
5449048771dcc1fac8f027267b01aa59.dll
-
Size
31KB
-
MD5
5449048771dcc1fac8f027267b01aa59
-
SHA1
8b8e75c7924be2f7e25142e621eb577c5cd3c03c
-
SHA256
2248250bbe25c29844c5582adbea43a563fb779b1a6b0bcde812f6bde5bd2890
-
SHA512
0cb0fa38c79b83b531b6b5495b50d6227cbbee798d38a87a80298cf07606e20b747be3622793beabf11370561d3e20c9f5dd85f73fa28a6481906da7f65a190b
-
SSDEEP
384:oBifNgGXNI/TGOCAxpSNzIi1H17ZFZVnrKIw6Et9MSiNxUNtkru5q1I+HsnYPLy8:o0fKGXNgSN0i1zJn2Iw6EtMgNtWC1N1Y
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3916 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3916 4124 rundll32.exe 89 PID 4124 wrote to memory of 3916 4124 rundll32.exe 89 PID 4124 wrote to memory of 3916 4124 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5449048771dcc1fac8f027267b01aa59.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5449048771dcc1fac8f027267b01aa59.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3916
-