Analysis

  • max time kernel
    20s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 20:13

General

  • Target

    849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll

  • Size

    951KB

  • MD5

    20feb83b592d5614b07b1f36ddce1110

  • SHA1

    6e923c1c17138e046eb33a997818b3c76d016cf1

  • SHA256

    849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c

  • SHA512

    c48b42de573c43b1249a16a906d0c771a87f2b8c5b2d0f0cb02d59aae4981418ae469fac81d94ee2096a625b561b93795fc19bf7f6fe854cf460a449b6c16f29

  • SSDEEP

    24576:lIhavuS5ZNdOaMZnPE9PXMcmklgCmcFgibBEk2YcEyB96:lVvdWaiiccTlwcu2EFYcD6

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\849ed0fbeb6e82ae7bab8a5893c7c8179b9fc3437cfc4fef19cbb879e9d52b9c.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1348

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1348-55-0x0000000075071000-0x0000000075073000-memory.dmp

          Filesize

          8KB