Analysis

  • max time kernel
    231s
  • max time network
    259s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:08

General

  • Target

    6f80ade78d11f66f1834161b464f3240ab8f23044e7c874ecbcbb1d9275f8861.dll

  • Size

    70KB

  • MD5

    0a8eaaade9a719163fa6432afd5c1792

  • SHA1

    bc89e7b223e0ef76cfa59c92232394219ec3585e

  • SHA256

    6f80ade78d11f66f1834161b464f3240ab8f23044e7c874ecbcbb1d9275f8861

  • SHA512

    e4c5e08cebbf62314fa528e1d04296ec0a3368e53890c2d8f8c09953aa00506bce0be53cb61549848c6d6e278031d656d1667b1c4c192adadcbf1df80f48ee77

  • SSDEEP

    1536:OX/s5ydxo3GNlK48vDLZbvm9aNaXmeNVX5hG2KIL9J:OX/98uZ+J8aSLjjR

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6f80ade78d11f66f1834161b464f3240ab8f23044e7c874ecbcbb1d9275f8861.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6f80ade78d11f66f1834161b464f3240ab8f23044e7c874ecbcbb1d9275f8861.dll,#1
      2⤵
        PID:4364

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4364-132-0x0000000000000000-mapping.dmp