Analysis
-
max time kernel
129s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
5b631a4b85b4d28f2e1b412c0b636e592b970f70982ef0853e3903b1e70316ab.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b631a4b85b4d28f2e1b412c0b636e592b970f70982ef0853e3903b1e70316ab.dll
Resource
win10v2004-20240508-en
General
-
Target
5b631a4b85b4d28f2e1b412c0b636e592b970f70982ef0853e3903b1e70316ab.dll
-
Size
628KB
-
MD5
4e69293084d66904773a1c1bdbabbf30
-
SHA1
c0051c6cbcc4402233dbbeeebc861619b05eea53
-
SHA256
5b631a4b85b4d28f2e1b412c0b636e592b970f70982ef0853e3903b1e70316ab
-
SHA512
b39a00de17fa5b7a26289b2d1c3d638c5fe6ac187b9ee36b2571a675576ccd2b9137e37ab09f57781ae92054fffc80a473602e5b018954ffd41e884daba83f8a
-
SSDEEP
6144:ESRJSkjBs7/+0W+ifcKr+E2KkS7Wgs4xmcIW5ZY7TaDsUHWbXkwKKwanVK/5:EoScMBW+ifcKaAx5xXY7s2bTnc/5
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1852 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1920 wrote to memory of 1852 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1852 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1852 1920 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b631a4b85b4d28f2e1b412c0b636e592b970f70982ef0853e3903b1e70316ab.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b631a4b85b4d28f2e1b412c0b636e592b970f70982ef0853e3903b1e70316ab.dll,#12⤵
- Suspicious use of SetWindowsHookEx