Analysis

  • max time kernel
    104s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 07:38

General

  • Target

    8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll

  • Size

    112KB

  • MD5

    49c3dd2f0553dafd19787f6a6e1d4165

  • SHA1

    46a277517fdec78183ba19c2eb05b9f17cdffc21

  • SHA256

    8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf

  • SHA512

    13d1d2ea44cf2f36e864adda1fdeed872f4c898e61e9e171620c25baa6aac1c83b8f7c2229cf4c337176b3c234a729ff8bf649d945640caf4d0f570e2b63f967

  • SSDEEP

    1536:jt+xVKz+tjjibQRmNWYjA0tFf35N9gSk89sTNwqBbqdADt7I628q2uN8Ials5VRz:jCwz+tnHYZ0wfFgSk7T+qBGE3FmBD+Vy

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll,#1
      2⤵
        PID:1572

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads