Analysis

  • max time kernel
    90s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 01:46

General

  • Target

    f01abdf7909967ae2b2fa4e56f8c9c8dcf1ad615f56e49d28250ca90d172e4b0.dll

  • Size

    4KB

  • MD5

    e9fb3c162b11fa1473ce2f95cc0b9ea0

  • SHA1

    8366ea78167e08e75983a318dc9bc3916d4e7040

  • SHA256

    f01abdf7909967ae2b2fa4e56f8c9c8dcf1ad615f56e49d28250ca90d172e4b0

  • SHA512

    4f9556faf5ec69693559b545d37709c74ae6e8a5a15fafa677cc11f1bb875c09f20a124218d821e4ca98a35327e0aa2b6431ae57911f6ea3c8ec1d4d2b44ab96

  • SSDEEP

    48:a5zuMqBcq06phM/wwWLSeJY8JTa6Il+LqGFx6ue6cTTyA/3eSrn:TRphMzf8qGFku/0y2Prn

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f01abdf7909967ae2b2fa4e56f8c9c8dcf1ad615f56e49d28250ca90d172e4b0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f01abdf7909967ae2b2fa4e56f8c9c8dcf1ad615f56e49d28250ca90d172e4b0.dll,#1
      2⤵
        PID:4572

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads