Analysis

  • max time kernel
    161s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 04:46

General

  • Target

    eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll

  • Size

    49KB

  • MD5

    2be3b9fd175b797a02ac6001275ef217

  • SHA1

    73a8da2dc793d1b05b0efc5661f1eb056ef52923

  • SHA256

    eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200

  • SHA512

    b07c4dd20f639ac43e05a2c036007c618763263318c7a17c341c0dea65c98e04fcf00f58bdcb699483bb889a0a6fe534c5e9af2eb22fa7ff014f755c04df8cb1

  • SSDEEP

    1536:9hkZY/JXqY9T4vq8YJtWb+EkPK9Pt0iRLyyueavitoZoqHoVnSo8U+cPo1touoDk:EK/JXqY9T4vq8YJtWb+EkPK9Pt0iRLyb

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll,#1
      2⤵
      • Adds policy Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:3588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads