Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 11:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
564db4dbfb0b4978c87b34b9e16b45f0.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
564db4dbfb0b4978c87b34b9e16b45f0.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
564db4dbfb0b4978c87b34b9e16b45f0.dll
-
Size
23KB
-
MD5
564db4dbfb0b4978c87b34b9e16b45f0
-
SHA1
640983fc4e37265cc3e4613333abd4db3104d60c
-
SHA256
2cebcfc204a56d98a7f73e9cce9f27fcf4245e62df0dec296867bf543e8d9a6f
-
SHA512
2192f3dc58b055a0e0ed600dd6297e18a91eae0ca13e326eada91b1cd2a2507545ba908da26a5ef4d84742c5d9e8ea8e65e842cdd74aa96c0028f631f2715713
-
SSDEEP
384:LqShFCmEAE2q2ejPAo6bm71lIYGF4KRqDpgK+pjKUQWmANW6o1w:LqSjClGbmfIFFtRKpgKEjKU95oC
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4704 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 552 wrote to memory of 4704 552 rundll32.exe 90 PID 552 wrote to memory of 4704 552 rundll32.exe 90 PID 552 wrote to memory of 4704 552 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\564db4dbfb0b4978c87b34b9e16b45f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\564db4dbfb0b4978c87b34b9e16b45f0.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4704
-