Analysis

  • max time kernel
    212s
  • max time network
    331s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:31

General

  • Target

    764471e6c74e5f42a87789790a022d466a64f5205e61622d45f1460f780e3688.dll

  • Size

    144KB

  • MD5

    44382cbaf98d27da5274c7ca743d33d4

  • SHA1

    9c53cb68d1f19ccb75de2146b66ac6fb2ffd71a5

  • SHA256

    764471e6c74e5f42a87789790a022d466a64f5205e61622d45f1460f780e3688

  • SHA512

    e9ee9ee24be4868eb54f52cc859890c3d9ea6f33acfd4ec7fb278cfa721a8f68b0843a4b249397c47407148c7f95d5b65b60de6293eb6209078f1bedbc42309f

  • SSDEEP

    3072:Y1lVtfBilaALZroDaIMNPs7UNyp4DUzgtbA9T4g80GIMQVo72:6BilZuhMRaU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\764471e6c74e5f42a87789790a022d466a64f5205e61622d45f1460f780e3688.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\764471e6c74e5f42a87789790a022d466a64f5205e61622d45f1460f780e3688.dll,#1
      2⤵
        PID:3284

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3284-132-0x0000000000000000-mapping.dmp
    • memory/3284-133-0x0000000010000000-0x0000000010025000-memory.dmp
      Filesize

      148KB

    • memory/3284-134-0x0000000000430000-0x000000000043F000-memory.dmp
      Filesize

      60KB

    • memory/3284-135-0x0000000000530000-0x000000000053F000-memory.dmp
      Filesize

      60KB

    • memory/3284-136-0x0000000000530000-0x000000000053F000-memory.dmp
      Filesize

      60KB