Analysis

  • max time kernel
    91s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 18:46

General

  • Target

    db.dll

  • Size

    101KB

  • MD5

    bcda36d95b2500908993f446f174f0e4

  • SHA1

    ea35726df90010fb86e86c57c6c9267304df759c

  • SHA256

    ef17c3fe7f1dbd32436937f68a7b1a3ba0e8c3e85e0ae2441adc4b9bf09fc4e0

  • SHA512

    446116a9261be0518b01450d35e9c66cd46f6d38f9552d45aaa34218aea1b70e17c2f11459a0b584fbf5956fffc0acebec6b9dcf06215660c2eefd9aba0e1478

  • SSDEEP

    3072:9nJV8z7bcC52M0fHwYvp865IsgFmT9TP4j:zV8ncCkFfZp86+gC

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\db.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\db.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2280-132-0x0000000000000000-mapping.dmp
  • memory/2280-134-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2280-133-0x0000000000401000-0x0000000000405000-memory.dmp
    Filesize

    16KB