Analysis

  • max time kernel
    158s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 00:50

General

  • Target

    d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll

  • Size

    4KB

  • MD5

    34d0cbf8fbefb18dcdeaf73b5e809080

  • SHA1

    be87d426ca15118bfc78273f71fddcc8fa1ad607

  • SHA256

    d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc

  • SHA512

    d48d0795a76c459d4856c7cfdb2ae7e415f50e4da873326dfa4ca56549b835acbdf100d648537f3eff5342bdb6520a3b2c8f4006d1dcc5486e70f1ff04f3d723

  • SSDEEP

    48:qHupGeMcCB96DrhWHR0FiIsipZlM+u+eAPMDQHpyuLv6omMJzmAwCi/:PMXB0rw0MI/pwbdE0/CU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll,#1
      2⤵
        PID:4236

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads