Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 15:39

General

  • Target

    7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll

  • Size

    371KB

  • MD5

    248a9c0b5e5eb218ece71cfbb3325480

  • SHA1

    eaa0c391afc80567059fc01d1ab9cd786c10f41c

  • SHA256

    7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53

  • SHA512

    f038ed18fc90429f105053396b0c6db49c9a280197b60a388b572c5153ab3fa346365f6872e89733d2ff20a5c9567ef75c055f0bf8f89f234efa46637fa5e64d

  • SSDEEP

    6144:e7j0G1gTiJZIscGoLEr9juVtfxB0R4yPPUK7z8PKqbGj5DuK7vFfTXO3yRSw4NiI:eH0/OJVOEpKzb0RpKPKqquK75XO3M0iI

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll,#1
      2⤵
        PID:4928

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads