Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8f4916ee34dd947bb9a0ef4cb9d3ed16.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8f4916ee34dd947bb9a0ef4cb9d3ed16.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
8f4916ee34dd947bb9a0ef4cb9d3ed16.dll
-
Size
62KB
-
MD5
8f4916ee34dd947bb9a0ef4cb9d3ed16
-
SHA1
cd5b22d47fd8352be1bd84bd40ead5b78e9b3a4e
-
SHA256
274b51c681990f393e282c74cb92bf5ba2ff3ef4501ffc99ef4f14b9e7d164c3
-
SHA512
835766ff9d80fd1396a37aa7327808d37838fa6eb422901494fd12092f5d64b8df01862eedcd44a3c27c68df65d7c5f39c09cc9630187e44a7ee06a7d31572e4
-
SSDEEP
1536:2cqF1QdMTt8ItxNohnxyKOnyN48BOhOhkN7m0V+AiFBg:u18MTt8KohngKkyNFOE+7vV+RC
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Wizet\Maple\npkcrypt.dll rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1712 1616 rundll32.exe 28 PID 1616 wrote to memory of 1712 1616 rundll32.exe 28 PID 1616 wrote to memory of 1712 1616 rundll32.exe 28 PID 1616 wrote to memory of 1712 1616 rundll32.exe 28 PID 1616 wrote to memory of 1712 1616 rundll32.exe 28 PID 1616 wrote to memory of 1712 1616 rundll32.exe 28 PID 1616 wrote to memory of 1712 1616 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f4916ee34dd947bb9a0ef4cb9d3ed16.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f4916ee34dd947bb9a0ef4cb9d3ed16.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1712
-