Analysis

  • max time kernel
    40s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 12:48

General

  • Target

    42c80fbe7c8d3cc435f5bf61bd889e4ef093b7bc04052fcc4f00422da5624696.dll

  • Size

    1.1MB

  • MD5

    b77353843624d5dfa70a071d25b8093b

  • SHA1

    d112b5efefc14789af150554e08db1282bf97615

  • SHA256

    42c80fbe7c8d3cc435f5bf61bd889e4ef093b7bc04052fcc4f00422da5624696

  • SHA512

    f0475bbf082018b6d4e92740f3d846147ddbd16678175f89e366fc005e7c1d85aa4053bd7fce081134d51183147b60caece485caf340a8b6d2645a0d959d3d66

  • SSDEEP

    24576:LYqXy239YT3FqXZ5LsEhxngZSOk2xGGJuMJ2qFQyFLq//+YE:UrNFqdD5xzJqnM+

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\42c80fbe7c8d3cc435f5bf61bd889e4ef093b7bc04052fcc4f00422da5624696.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\42c80fbe7c8d3cc435f5bf61bd889e4ef093b7bc04052fcc4f00422da5624696.dll,#1
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:980

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/980-55-0x00000000766D1000-0x00000000766D3000-memory.dmp

          Filesize

          8KB

        • memory/980-56-0x00000000707C0000-0x0000000070CCA000-memory.dmp

          Filesize

          5.0MB

        • memory/980-60-0x00000000707C0000-0x0000000070CCA000-memory.dmp

          Filesize

          5.0MB

        • memory/980-61-0x00000000707C0000-0x0000000070CCA000-memory.dmp

          Filesize

          5.0MB