Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 00:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
577bd2a7357d1e5ea4f4425c1c9e93d4.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
577bd2a7357d1e5ea4f4425c1c9e93d4.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
577bd2a7357d1e5ea4f4425c1c9e93d4.dll
-
Size
13KB
-
MD5
577bd2a7357d1e5ea4f4425c1c9e93d4
-
SHA1
1bc8c0d552f94b9964cc02e6d53ef2a34d93cd28
-
SHA256
b54bb1f82260c2b1f48fb9074b5f8b38793386273da351957ff91d95d25b349a
-
SHA512
da8520d67d90a41a2c9832dddcdeb057b378f3d3e90ba4850cf4e7e464fd11f5b061954685cdc1037c533009258f5e5e6b77076f5d9bf7f607f8b3fc9ef4a5a4
-
SSDEEP
192:L1VGddS1knRnnfv0Y7uxBbsdSTKz9RtiThbN7AoesdpixeaC9qbM:5VGTS6nJfT7KQd2E9E5hA3sdpi7QmM
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4844 rundll32.exe 4844 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4844 4296 rundll32.exe 76 PID 4296 wrote to memory of 4844 4296 rundll32.exe 76 PID 4296 wrote to memory of 4844 4296 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\577bd2a7357d1e5ea4f4425c1c9e93d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\577bd2a7357d1e5ea4f4425c1c9e93d4.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4844
-