Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 18:22

General

  • Target

    8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll

  • Size

    35KB

  • MD5

    814f50853a0ad328a7c79ab2e68ef0d0

  • SHA1

    3835f6cefcdd6b782fe93f748ce35a83bb1a3650

  • SHA256

    8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89

  • SHA512

    baa8847265640c04159d084d55f6cbb5bdbf53d71b33182fe94d4adf8cb2e4f2dd8033e5a025c07312d9550b83480185d89e623eeb6928d567041da2f1f17a71

  • SSDEEP

    768:lTbxTgUxy3aRnXhX6SGBYJK01KGfH7iGEgnom0CiVF:lT10UxxXUSwGS2H7pbomRO

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a3a981b22e2b6c19b1317879de59f022c93e5d572adc0029583effb2b3f8b89.dll,#1
      2⤵
        PID:1156

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1156-55-0x0000000076461000-0x0000000076463000-memory.dmp

            Filesize

            8KB