Analysis

  • max time kernel
    75s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 02:19

General

  • Target

    6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll

  • Size

    6KB

  • MD5

    d57fbc8f7d817d05759ca4b4d2eef040

  • SHA1

    926cc1ef31e561e6d921a7472e31a3fc7e48b285

  • SHA256

    6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57

  • SHA512

    b2301deaeede1a2fac1cc36b7e6b8b34497def9e296eacd7b31fa8150890303bfeb69fa5104da9e37cd1366bc8e117d4bb1a815fbc73a582be42d92b2ea3b662

  • SSDEEP

    48:SfIBj0W6/aGxkaklS4rklStklSd8klSPklSTIZGifi5qwlGsPvw16ShuDSSM+b+m:DixZjmjtjd8jPjcZGR5TI16S4SM

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll,#1
      2⤵
        PID:1612

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads