Analysis

  • max time kernel
    40s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 05:50

General

  • Target

    3a05c248bd4184db77d5dc4f8ab8201d2aa2a91e0676b5597726418f60334e1c.dll

  • Size

    6KB

  • MD5

    658c4fb6530d36655e49dcb56bcdde50

  • SHA1

    b907334b8c5365b2e2c22e23676c8fd147385ff3

  • SHA256

    3a05c248bd4184db77d5dc4f8ab8201d2aa2a91e0676b5597726418f60334e1c

  • SHA512

    ee49601a7d2b326a7a5a4c866626004c80f9087bb16ef088bf6bbd2e500dcc598f2946c9a76872b06a699c5484e7e84ff2a00f6e3df06c3c7294b15ef114d7b4

  • SSDEEP

    96:PIV9yIjhsZrg0j6I/AhWNiZRH3g6TfrLxrD+jFgMFh:PyIIjWXGhqwwO1

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3a05c248bd4184db77d5dc4f8ab8201d2aa2a91e0676b5597726418f60334e1c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3a05c248bd4184db77d5dc4f8ab8201d2aa2a91e0676b5597726418f60334e1c.dll,#1
      2⤵
        PID:1852

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1852-55-0x0000000076151000-0x0000000076153000-memory.dmp

      Filesize

      8KB