Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
7b52d618a94315c99b279504478685f2.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7b52d618a94315c99b279504478685f2.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7b52d618a94315c99b279504478685f2.dll
-
Size
52KB
-
MD5
7b52d618a94315c99b279504478685f2
-
SHA1
3aa4fe95f209efcb4a294d002dedec2ed5fda5b8
-
SHA256
8a99bef4d143c38c39c3a391a0937e4263a1cdf0daa68949455bd44f71121bf6
-
SHA512
255575fa5b43e99c5a89d4fb7ff293c7f782da9f83a932153edf0d4ff588f0d484fb7282b48f39e8d1f4e0a688e9fbdbe31c03706d1c2c355758782fadea6904
-
SSDEEP
1536:KhgOWCWnepjm64tfhpgv5x4QiMGpLHFuC:KgroSqiMGhHFuC
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3580 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3580 1592 rundll32.exe 88 PID 1592 wrote to memory of 3580 1592 rundll32.exe 88 PID 1592 wrote to memory of 3580 1592 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b52d618a94315c99b279504478685f2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b52d618a94315c99b279504478685f2.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:3580
-