Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll
Resource
win10v2004-20240508-en
General
-
Target
a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll
-
Size
932KB
-
MD5
c15f476f750976391271010d262f9cce
-
SHA1
2970f5e3dc1f078f24b10467f5e7571417dabdb5
-
SHA256
a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1
-
SHA512
ac55cd502f8702bf4914d2a53734bfe02c2949a8e58165922796fa94b1ecbe4030587c081a1775868012cc3d9177a0235ffd46c8574a7d689a8e4de00f6aee19
-
SSDEEP
12288:mROtmbqypDhkNlsV79scSfzTxWdpG15ygO/n2Tisea:m1bqy9hylY7/SSXP2Tisea
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4604 3160 rundll32.exe 80 PID 3160 wrote to memory of 4604 3160 rundll32.exe 80 PID 3160 wrote to memory of 4604 3160 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4604
-