Analysis

  • max time kernel
    88s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 04:19

General

  • Target

    5909c30029704cea57a50c08aa196c34c80403fd2aacd450994f5f6185a97e6c.dll

  • Size

    70KB

  • MD5

    6cd1e237e1d81702a6fa1b051494bbfb

  • SHA1

    2c01275036316782112ece848a79d238967a109f

  • SHA256

    5909c30029704cea57a50c08aa196c34c80403fd2aacd450994f5f6185a97e6c

  • SHA512

    bc79b0c878fc0fb3668937998fd35b5d55b514fae40687c1679656c8b8582b2dc7b3e777735a8ce3385a914e470c18e4757230b99255ab95406a615136abc725

  • SSDEEP

    1536:4XkTnJx7aoSpgbCuEPEs/+YQKsi2f6/QvqboyUJzVi4:SKJxuot6p/7h2f64SbxqVi4

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5909c30029704cea57a50c08aa196c34c80403fd2aacd450994f5f6185a97e6c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5909c30029704cea57a50c08aa196c34c80403fd2aacd450994f5f6185a97e6c.dll,#1
      2⤵
        PID:3036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads