Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 02:48

General

  • Target

    201010ea7eaa93ce4db14810fa471f843195adfa29ab1c7b90fb3f12a05e31f4.dll

  • Size

    840KB

  • MD5

    f3b8c411ed15077798e333d2b63fd167

  • SHA1

    727599a402ea2c1256af05f24ae3d62857f0a021

  • SHA256

    201010ea7eaa93ce4db14810fa471f843195adfa29ab1c7b90fb3f12a05e31f4

  • SHA512

    44b8fbbfac5a49be7e4c0ef489ea3c6ebe17e05b5b4e6e03eb16b041d68615ce53311af6f46038a0a73e82cef213ce60b71b2cb1c5adcdc5b3bed678deaa1ef1

  • SSDEEP

    24576:ten1JxpQ045hgW4AXLNFjAEwmNyzUBHizTy27Y+XtB7MU+Ihfm7+:ten1T4DW

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\201010ea7eaa93ce4db14810fa471f843195adfa29ab1c7b90fb3f12a05e31f4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\201010ea7eaa93ce4db14810fa471f843195adfa29ab1c7b90fb3f12a05e31f4.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1364

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1364-55-0x0000000075281000-0x0000000075283000-memory.dmp

          Filesize

          8KB