Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 09:39
Behavioral task
behavioral1
Sample
a18af44de4bab7b45928632af371800a.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a18af44de4bab7b45928632af371800a.dll
Resource
win10v2004-20240221-en
3 signatures
150 seconds
General
-
Target
a18af44de4bab7b45928632af371800a.dll
-
Size
29KB
-
MD5
a18af44de4bab7b45928632af371800a
-
SHA1
53ce11648eb0d52158fe25f44edf20acc40d6011
-
SHA256
55651233717933794f21620e176f03592bfdd82403d21cafe09d99c858bdea1c
-
SHA512
b8ab8d4ee91244d6279e3de2cf23e766f4e97e284228f14c8eaebc63dfa9cb0aad34c00a549e1597702481a87c14a609d951b73768f9eff023347153b63bdd89
-
SSDEEP
768:uod+R0NVfKMDnroDdKQLilMmQFxDha5b:uA+R0LCM30dKOXmWA
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Wizet\Maple\npkcrypt.dll rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1616 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 1616 3560 rundll32.exe 89 PID 3560 wrote to memory of 1616 3560 rundll32.exe 89 PID 3560 wrote to memory of 1616 3560 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a18af44de4bab7b45928632af371800a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a18af44de4bab7b45928632af371800a.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1616
-