Analysis

  • max time kernel
    256s
  • max time network
    277s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 23:20

General

  • Target

    10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll

  • Size

    5KB

  • MD5

    89a5e09a263ae18234427293cb6b8370

  • SHA1

    6cac5fb0efb832181041c12669708f988199ce70

  • SHA256

    10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc

  • SHA512

    214d234eb073eb41d02438b00e5bda590efc920aee0303f1951ce5fc24fe6a3c4fe2489ed728c3d5fe69f64cbcab9c337a6392be67de94d0393f2e99145193f5

  • SSDEEP

    96:XprYDpKnI6wJ+Ls7guyHejyn/I9l0iaiBoSGhZ:XUcA+ggd+W/If0iboS6Z

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll,#1
      2⤵
        PID:2696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2696-132-0x0000000000000000-mapping.dmp