Analysis

  • max time kernel
    166s
  • max time network
    223s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 02:06

General

  • Target

    86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll

  • Size

    171KB

  • MD5

    908b5e881b7814ff9cd92ed770508ad4

  • SHA1

    4452f67a77b0492991c1ef07c05ea6a010e70485

  • SHA256

    86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c

  • SHA512

    55c8d4d4857c4df17a26c6f9a98c81a70ba2822aa20fa8510aa0c1d885d301fbafecef2dbca945afb8eba17a7f340b8666b89fb3ec8219e461c7f70cfa648041

  • SSDEEP

    3072:OQV9qkfbCd3wQfF+DU5lJcTGubd9Irjwv+d0EyF0pEnaUDsIl6R5ld44j0XYD:OufbCBwQI8D6FKrjb2u3KTqDBC

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll,#1
      2⤵
        PID:2112

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2112-133-0x0000000001240000-0x0000000001255000-memory.dmp

      Filesize

      84KB

    • memory/2112-134-0x0000000002A10000-0x0000000002A3E000-memory.dmp

      Filesize

      184KB

    • memory/2112-138-0x0000000010000000-0x000000001002E000-memory.dmp

      Filesize

      184KB

    • memory/2112-139-0x0000000001240000-0x0000000001255000-memory.dmp

      Filesize

      84KB