Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 02:55

General

  • Target

    7b2375650d2e6ef2064de287eb83c525345ca0ee2fc8d11e8368d5295c08c4c8.dll

  • Size

    66KB

  • MD5

    7f0878bb21610c28c29fafc38f9b9bec

  • SHA1

    477f25377aa676f6bee4935d9d3e424fa6064ec8

  • SHA256

    7b2375650d2e6ef2064de287eb83c525345ca0ee2fc8d11e8368d5295c08c4c8

  • SHA512

    9d3efb9053e10a6dbb6ba5c2267ab78552f2938962ef7f6c6b0e04932921ba87448bbe71c96a35f9a377032b2cd9ea45dbe4381be2d5061c3d511a3785034130

  • SSDEEP

    768:9xBtKtqyLU3UZHImreLNRZoSzPmEv35hNoKbcphpxAh3Gk/ncStGllM0vBxr7Y/Y:9NUGxLNnoSzP5I/IGNVYspOnWAIJz

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b2375650d2e6ef2064de287eb83c525345ca0ee2fc8d11e8368d5295c08c4c8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b2375650d2e6ef2064de287eb83c525345ca0ee2fc8d11e8368d5295c08c4c8.dll,#1
      2⤵
        PID:4556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4556-132-0x0000000000000000-mapping.dmp