Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 05:09

General

  • Target

    1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll

  • Size

    22KB

  • MD5

    0c94dfea9d0e4f0f4a6607a906d88c30

  • SHA1

    c0375254aa8d1c937709e3f19751d24bb7df3b62

  • SHA256

    1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1

  • SHA512

    549bd6fcef37ffed62fcaa2207fcc47e43ba2a07fcdbc5ae0da4020fb8ba239bf1e1e91ecd66157d2aa33f4300d47b263448e3857a73e0461a95cb7368e1497e

  • SSDEEP

    384:3QJPDrZIs+y7EvsJ5KLyueKzzsPQwoh57zxBLVyUFK+fDApGaX1/pglXrEV:yPDrCs+qEkJ5KeK+7oLfVyUFDwBpAXg

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll,#1
      2⤵
        PID:900

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads