Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 01:05

General

  • Target

    8e4ca93443742c1c11461c86a66b2515da9163d6d8c57ca2d5ac8be366a5a915.dll

  • Size

    212KB

  • MD5

    a2b28196c68949ddaa8801408c01e870

  • SHA1

    d543f58dae2de6b833b41c18f746f7326c31ffa0

  • SHA256

    8e4ca93443742c1c11461c86a66b2515da9163d6d8c57ca2d5ac8be366a5a915

  • SHA512

    d7ca7475908147141a9c727a7fb489b64a0482a43ceab2eb9af403a296eaec77e68adee2a5be6121a332587b5617f781c7af28baeaca72419bf0183b7c51f7b9

  • SSDEEP

    6144:yEOgRVVYScHH/bK/UMnp6G21RJmBfcVhWsoxQ/EBRU0R+uE:y5gfqVnzUnMGmRJmkhyxnBRUi+u

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8e4ca93443742c1c11461c86a66b2515da9163d6d8c57ca2d5ac8be366a5a915.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8e4ca93443742c1c11461c86a66b2515da9163d6d8c57ca2d5ac8be366a5a915.dll,#1
      2⤵
        PID:1128

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1128-55-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

      Filesize

      8KB