Analysis

  • max time kernel
    92s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 12:29

General

  • Target

    6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll

  • Size

    175KB

  • MD5

    0542836e666a8d4952b994f0a0d49200

  • SHA1

    f3780bebea334ef4e226e04760fd8c5963a16d13

  • SHA256

    6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71

  • SHA512

    fd789e13513fc98d7b5c26f237d81e610d56f4010cdec03d364cae92f3da1220c1b97c73cb659349367dfbdca90a88220ef92ffffe543a0d6200d5c7da36e296

  • SSDEEP

    3072:AlcNNqwnIuJQEYgcf9uy4O+Svs3KnxaAs8RDE9:AlVSKH59uy4OLUb8C9

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll,#1
      2⤵
        PID:5060

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5060-132-0x0000000000000000-mapping.dmp