Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 14:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b764e7170c12d37d44488eb32e5018e.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b764e7170c12d37d44488eb32e5018e.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
5b764e7170c12d37d44488eb32e5018e.dll
-
Size
25KB
-
MD5
5b764e7170c12d37d44488eb32e5018e
-
SHA1
c66190240cb0a796f092b95153805b27e21fb887
-
SHA256
844069d3234135be206583c7eee8c63adad2d7c2e9fb4e690c1116ac4b3628a1
-
SHA512
8c0b7ca2ee8ebf35639ecb805d1439c63b2ab5586c81aca359933f5c35e13e63ad289d44b28a3ae306b2f0dde22dc394a2068daa5e1a8cceb64548c4773d5df5
-
SSDEEP
768:Tx8yyGDF/FPuooEBKwbCt4GhyCsZ8Sez:F8yywOooOjC9z
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 2880 3420 rundll32.exe 24 PID 3420 wrote to memory of 2880 3420 rundll32.exe 24 PID 3420 wrote to memory of 2880 3420 rundll32.exe 24
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b764e7170c12d37d44488eb32e5018e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b764e7170c12d37d44488eb32e5018e.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2880
-