Analysis

  • max time kernel
    122s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 01:03

General

  • Target

    7d1d758453a99620fbd8c13d3f9a24e4006f9531d5c33ad4c4b22668c6f19177.dll

  • Size

    140KB

  • MD5

    050abf8c59a80965fb7df119b5768e1b

  • SHA1

    4e0bd6d767ed38d83c95ed63a04881a60f05450a

  • SHA256

    7d1d758453a99620fbd8c13d3f9a24e4006f9531d5c33ad4c4b22668c6f19177

  • SHA512

    d00ea4908c0272e32d07cb2a2d784af1d88b0c20d3b24d82b0086b56955593ec7ea5dc8a57852cdd5cdc8b9f45314e47981cb893b6531c6a956a12223ce300ba

  • SSDEEP

    3072:9sgwEvM3z0BQg/S3jSEUl+Welmef2Aze001gCm6+k0IiG:9sge3wXCQefZCm6++

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d1d758453a99620fbd8c13d3f9a24e4006f9531d5c33ad4c4b22668c6f19177.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d1d758453a99620fbd8c13d3f9a24e4006f9531d5c33ad4c4b22668c6f19177.dll,#1
      2⤵
        PID:2016

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads