Analysis

  • max time kernel
    36s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 01:04

General

  • Target

    ed8e0758953218a1b2d70ae1bf9e2b9724caf75f44f8688277851f9c692c96d2.dll

  • Size

    298KB

  • MD5

    6ac22b6c3979f74a55378d2260d06160

  • SHA1

    0a9a380f8d581f7213f73c7ef8a71705061775e3

  • SHA256

    ed8e0758953218a1b2d70ae1bf9e2b9724caf75f44f8688277851f9c692c96d2

  • SHA512

    415cc98607c6418f3e6b38126d7a5e568c0e2bee49aadedef94bb28e7d6eb696d62d35f802eb368ac79c236b03b927186724c4df3e003e6e45bd5cc0a351e11a

  • SSDEEP

    3072:AWvv/MPQA1rUZx2pUXBL99Lqbb4okBEZzczewNWmpAdE6ffVPT6IdXya0RsrroNO:rWg

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ed8e0758953218a1b2d70ae1bf9e2b9724caf75f44f8688277851f9c692c96d2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ed8e0758953218a1b2d70ae1bf9e2b9724caf75f44f8688277851f9c692c96d2.dll,#1
      2⤵
        PID:1360

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1360-55-0x00000000756A1000-0x00000000756A3000-memory.dmp

      Filesize

      8KB