Analysis

  • max time kernel
    186s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 19:51

General

  • Target

    fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll

  • Size

    51KB

  • MD5

    f3d4237f41e1a24d1ec1bd0e6e659d30

  • SHA1

    5b12d1641197c65a1fabb2c938c9f90b6e16617d

  • SHA256

    fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d

  • SHA512

    79b092d8497827fdc9db742ee208948cca064333970785815d3b0e6a15946b8e84bba7c3a1d6124f980b2118fd938eb1f0b85d62890c334e0190539d2f3da543

  • SSDEEP

    768:kHwfLvO380astJMore8IowRBlo4Zus56yaLjmT/qWGN3u+cTqaUw9p:kQfr05tz6lw4Ms56yanmDqWM9w9p

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll,#1
    1⤵
      PID:1500
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1772

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads