Analysis

  • max time kernel
    189s
  • max time network
    248s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:25

General

  • Target

    627496c75012b7667f34c7f033bfbd12cb4214402a1b02e147be6469f86ea47e.dll

  • Size

    147KB

  • MD5

    78397232928e1b53fa0d379f6bae541c

  • SHA1

    ec42c79d8832503e6ef8051572b5c51395013131

  • SHA256

    627496c75012b7667f34c7f033bfbd12cb4214402a1b02e147be6469f86ea47e

  • SHA512

    ac5b23a6b08fcae88eb170e424dacc34225b41a5fd238412c649a665ab1e04d81a71a3344a49fcf69659c4a4f70e9cc540015496e7424520308dc3b0d444c3a7

  • SSDEEP

    1536:+AcIfMI7IjkuvfZ/AuwdcLN3KybbUm8odCwPXkdrNYVWmCcno7GBTAcsqd1KJb:+XfU8xvfGdo3KAFgdrNYVWfcPAsc

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\627496c75012b7667f34c7f033bfbd12cb4214402a1b02e147be6469f86ea47e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\627496c75012b7667f34c7f033bfbd12cb4214402a1b02e147be6469f86ea47e.dll,#1
      2⤵
        PID:1744

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1744-133-0x0000000010000000-0x0000000010027000-memory.dmp

            Filesize

            156KB