Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 06:33

General

  • Target

    0fc8b4e33bff1e7fd0ce28c817766ff15838a4cd0ca2c8de1568c25d0856c4ae.dll

  • Size

    64KB

  • MD5

    813652f3ca26e9dff869228b31571f70

  • SHA1

    b9a628f5c2514eee7d1aa88c70500b35c407fb52

  • SHA256

    0fc8b4e33bff1e7fd0ce28c817766ff15838a4cd0ca2c8de1568c25d0856c4ae

  • SHA512

    97f829eda21e01727d3e992368939eeccd37d77fe7ca1a5ae3c64e4f3379d07b3499c125442209f83b738662add7c62fcc031d5e8257482bd3a3e779640c91ed

  • SSDEEP

    1536:YePTkZKUT5qq2hu0TgzP5bbT8vqtdJ6UtaC6:Yeol0huh4CtjLtaC6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0fc8b4e33bff1e7fd0ce28c817766ff15838a4cd0ca2c8de1568c25d0856c4ae.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0fc8b4e33bff1e7fd0ce28c817766ff15838a4cd0ca2c8de1568c25d0856c4ae.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2004

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads