Analysis

  • max time kernel
    145s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 16:27

General

  • Target

    8fe1681ff7190bcfc619a3276697106a32c69a6098afe40cb1b214d79e7308af.dll

  • Size

    81KB

  • MD5

    ce225d5ee413af3ebb0d10ff59bbe7bd

  • SHA1

    2805d50198bb72f6d1af670b29c72c370602f741

  • SHA256

    8fe1681ff7190bcfc619a3276697106a32c69a6098afe40cb1b214d79e7308af

  • SHA512

    4e729e1316ccd13af015353f514f3f3eafc8cfcea89738d295e98638e50179b37bddd114627ab363c12a8b3b2541389c581d5d981c27d99ecbe7d8dc333c099b

  • SSDEEP

    1536:7B3gK9Xo7SAqKvSWEAd6B1G7ra8AAJipEMkLgwnu057T52t/8SMB:m6o9qKK1+6B1GxAZpsEGPxd5B

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8fe1681ff7190bcfc619a3276697106a32c69a6098afe40cb1b214d79e7308af.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3344
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8fe1681ff7190bcfc619a3276697106a32c69a6098afe40cb1b214d79e7308af.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:4384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4384-133-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/4384-134-0x00000000012B0000-0x00000000012BF000-memory.dmp

    Filesize

    60KB

  • memory/4384-135-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/4384-136-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/4384-137-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB