Analysis

  • max time kernel
    38s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 05:41 UTC

General

  • Target

    20fe52865401fe1a14b30376895336afbd6a31b371727b403419c3bb880e9c61.dll

  • Size

    4KB

  • MD5

    740f48d88ddc739cc2a96de96fb8d3f0

  • SHA1

    edb06cd664af5e319d53d7004809e1f107117362

  • SHA256

    20fe52865401fe1a14b30376895336afbd6a31b371727b403419c3bb880e9c61

  • SHA512

    4d18444709d49ab6f2c8d1c5ff37a80a61c005c5c8a0c7f89f0233f3120f52ec13bf59ae1451102bf94e18b3c365ef5d22ec45334c0dfedfffc8601dd357038b

  • SSDEEP

    48:iMHGv8j2IcW89NYEArhWHR0MiiIsiI6lXVkqlcH2SuiS6o+mm9MXC/1:PmkiIz8UZrQ0MhI/ITqly9x

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\20fe52865401fe1a14b30376895336afbd6a31b371727b403419c3bb880e9c61.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\20fe52865401fe1a14b30376895336afbd6a31b371727b403419c3bb880e9c61.dll,#1
      2⤵
        PID:1956

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1956-55-0x0000000075F81000-0x0000000075F83000-memory.dmp

      Filesize

      8KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.