Analysis

  • max time kernel
    194s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 18:28

General

  • Target

    7b049f6160dd073950948b825702366a9a50bb591325228e40d896322d248822.dll

  • Size

    84KB

  • MD5

    446752da87aab9753d43a552470fa532

  • SHA1

    8f030cdb944c48d336dacc9b7e36278606bf8ee8

  • SHA256

    7b049f6160dd073950948b825702366a9a50bb591325228e40d896322d248822

  • SHA512

    d9360510794820beeeec3c17f8c64706cea61c9acce92cedbf1f8abd14f2b534bb27fe726f4b4d8ff3f8512e16274346d50a4aaaf2390e249ed696412e77e7da

  • SSDEEP

    1536:xhVZqOONvXjpOGdHo5HnGImKU4uYjJWvozgJx4kpdL0/p3gAt:xdqO2LvHoZnvmKUJ0Jsozex42dgHt

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b049f6160dd073950948b825702366a9a50bb591325228e40d896322d248822.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b049f6160dd073950948b825702366a9a50bb591325228e40d896322d248822.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      PID:4948

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4948-133-0x0000000010000000-0x000000001001A000-memory.dmp

          Filesize

          104KB

        • memory/4948-134-0x0000000001610000-0x000000000161D000-memory.dmp

          Filesize

          52KB

        • memory/4948-135-0x0000000002DD0000-0x0000000002DDD000-memory.dmp

          Filesize

          52KB

        • memory/4948-136-0x0000000002DD0000-0x0000000002DDD000-memory.dmp

          Filesize

          52KB

        • memory/4948-137-0x0000000002DD0000-0x0000000002DDD000-memory.dmp

          Filesize

          52KB