Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 22:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c6fc7a303392ef2927eeb77ee384774e.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6fc7a303392ef2927eeb77ee384774e.dll
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
c6fc7a303392ef2927eeb77ee384774e.dll
-
Size
49KB
-
MD5
c6fc7a303392ef2927eeb77ee384774e
-
SHA1
1e382fcb208fec88943a8e313150295899630ab9
-
SHA256
912e290d7052ef77bd29b037b4eda82f3adc0a8cda672d1d52953039071ce089
-
SHA512
ff0007ae106fe5d912c3fdf4494591af3a03e5e4c1a8e0ff63e27c98483c7d7514136c59f22c60417b295cfb0b49ed206b6954c3db0da0eb53b58c286b921308
-
SSDEEP
1536:in6bJsMjjtGxPMAIEDjk6k/wZLebavvwBB:zbSMjIPMiXA5v
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jewehobo.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\piwudenu rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4184 4820 rundll32.exe 88 PID 4820 wrote to memory of 4184 4820 rundll32.exe 88 PID 4820 wrote to memory of 4184 4820 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6fc7a303392ef2927eeb77ee384774e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6fc7a303392ef2927eeb77ee384774e.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4184
-