Analysis

  • max time kernel
    45s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 15:33

General

  • Target

    3aac672b2aaf6613d246407d3a0d1336653711c9ad272cbb188b22da496d1e49.dll

  • Size

    56KB

  • MD5

    b593505954046cf99b3342f66469b6d5

  • SHA1

    e2aaf9f586933e14260dc1b869f782b543cad937

  • SHA256

    3aac672b2aaf6613d246407d3a0d1336653711c9ad272cbb188b22da496d1e49

  • SHA512

    9ee7e089be61f87bad51890f53f1142adfb84224a5b1e03ea7b0d2a03a253ece1121d83223fe8d4b1351d40e64282e1cbc4b7122cf915f2645ea132c10a31e3a

  • SSDEEP

    768:lZOcG2Z/J4kJdk9u1hXnFC0mUY1bVlbpuEtgSR+cuFAxZe0jAssO+wcSDPnGMEad:TbPhXk9Wh00s0EtgSsAjcGDvlELC

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3aac672b2aaf6613d246407d3a0d1336653711c9ad272cbb188b22da496d1e49.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3aac672b2aaf6613d246407d3a0d1336653711c9ad272cbb188b22da496d1e49.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-55-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB

  • memory/1628-56-0x00000000005F0000-0x0000000000602000-memory.dmp

    Filesize

    72KB

  • memory/1628-59-0x0000000000390000-0x00000000003A2000-memory.dmp

    Filesize

    72KB

  • memory/1628-58-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/1628-60-0x00000000005F0000-0x0000000000602000-memory.dmp

    Filesize

    72KB