Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 05:00

General

  • Target

    789c6d49c9ca78014bf2f58306d6867ea51861e6b2bd94b4f76d3abbcc57532d.dll

  • Size

    67KB

  • MD5

    090148e574bc6d1ad45f37d48af1e8b0

  • SHA1

    b2c8fec43b4cb07d8662f7be03849ea7cb7b5f37

  • SHA256

    789c6d49c9ca78014bf2f58306d6867ea51861e6b2bd94b4f76d3abbcc57532d

  • SHA512

    3cb940531572c7d4f7da633939febb38f493dd32f8a36e47d118c9a5195419818c9f6231655c44de4998a729081e4d69e7876b68f6115534d2de37010266cbfc

  • SSDEEP

    1536:Cn5P0l70x5CJpVxVAV7r/IwLrzL13bommKnZJw//22pdvTgfd+iwYqaLU:w5s70x4JpVnKrnrzZrdmKn8//2Gsw8U

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\789c6d49c9ca78014bf2f58306d6867ea51861e6b2bd94b4f76d3abbcc57532d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\789c6d49c9ca78014bf2f58306d6867ea51861e6b2bd94b4f76d3abbcc57532d.dll,#1
      2⤵
        PID:4940

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads