Analysis

  • max time kernel
    139s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 15:59

General

  • Target

    1f9d92b00e58c62d9c7c802c39be4259a35d675e30b5188eb1cb886c486728ba.dll

  • Size

    4KB

  • MD5

    089fd5af278941a19ceb22b8ba11b6c3

  • SHA1

    14912864b11327deb2bc8a0e00ffe4f18d70de67

  • SHA256

    1f9d92b00e58c62d9c7c802c39be4259a35d675e30b5188eb1cb886c486728ba

  • SHA512

    5a5c9c782c17921f81f1e43d8438375d36d99f61e4bcf4dccdcc08c896de83e540e5e2fe55051f8ee11ff30f1044ca1568f59ee963ec0d8a0904daf7592b81e8

  • SSDEEP

    24:eNGS5k4V4cW3Ce8WG/QPVGRVtq44MBZlZVtQ58kwVIaH40RWIcVQ/x7F0VLs0uPB:a5zjMTGcITBVQVE1lcc1FMgPLQg4FM

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1f9d92b00e58c62d9c7c802c39be4259a35d675e30b5188eb1cb886c486728ba.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1f9d92b00e58c62d9c7c802c39be4259a35d675e30b5188eb1cb886c486728ba.dll,#1
      2⤵
        PID:4112

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads