Analysis

  • max time kernel
    169s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 06:08

General

  • Target

    7712ddd954234f25bf303becdcb431e4f35e177021d9dee18bd9ed8588c0fe1b.dll

  • Size

    184KB

  • MD5

    af6d06d24478c018ee1fc56333d3b1ce

  • SHA1

    7e79c7720023a341879b6a35022dcb4a6804917f

  • SHA256

    7712ddd954234f25bf303becdcb431e4f35e177021d9dee18bd9ed8588c0fe1b

  • SHA512

    ca9e3acb73b60a58bd0e26281ff718e653ed37703cfaa4d61491735ca55d605ae94c37be56941ae312db9ef327267aa7e6f5594904751e3c433e506cded7a562

  • SSDEEP

    3072:C68X0Spw6JrXlCNk8QaXu9r2DkdfJFbwfeuZU8bO2YtnxpmI/dwZ/:CVhgS2aXZ0UfxnxpmadG

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7712ddd954234f25bf303becdcb431e4f35e177021d9dee18bd9ed8588c0fe1b.dll,#1
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:4252

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads