Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 04:58

General

  • Target

    910f3ad23091783825604d4d5e2f077cdaefc014e3a219b101318400d6383f2a.dll

  • Size

    63KB

  • MD5

    0e15c818847a6a7f4f0d265b7912e8a0

  • SHA1

    162b8ac89a24e3cf3e6fbd7fa096a9b00a16e18c

  • SHA256

    910f3ad23091783825604d4d5e2f077cdaefc014e3a219b101318400d6383f2a

  • SHA512

    bd2e52c8d4c9a3a241bae5164d493de6c38914443ca905f8ace9420b60dfcf823a9550773d9c48233e4d213cdbc73bebbc221c92d7d445c4a57104ea2f6f2126

  • SSDEEP

    1536:mPO6KEVbsVP0gODKQBWhJGDOojNJbAsLP6W9B7auQqySJc:cMEVbsVcJD/ELGDFfP6WCuQ/P

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\910f3ad23091783825604d4d5e2f077cdaefc014e3a219b101318400d6383f2a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\910f3ad23091783825604d4d5e2f077cdaefc014e3a219b101318400d6383f2a.dll,#1
      2⤵
        PID:1364

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1364-55-0x0000000075281000-0x0000000075283000-memory.dmp

      Filesize

      8KB