Analysis

  • max time kernel
    152s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 03:24

General

  • Target

    652e2edb1763181f4b71e18b250f36d892a9c39fa488726adaf13a1f5cc22884.dll

  • Size

    68KB

  • MD5

    b7b41dc1de79d3842cbc385aff172639

  • SHA1

    00d30c1438bdd3b9314d023de2622b6a2b156fff

  • SHA256

    652e2edb1763181f4b71e18b250f36d892a9c39fa488726adaf13a1f5cc22884

  • SHA512

    ee95316ebe23db4fd9d0412448e7cde96bdef45b40bce0f01be831e301e1fa6f245d8a637ee5c4436d0077122749865a0104786c7e77d747d29748760d0c82f1

  • SSDEEP

    1536:agF0eiyUcbgjuFC/czRhMqskBDwGV/Opg3Dx5ivO2sryUjeUvW:t2yFW9/RqPl3/OpyD6vO2sryU5O

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\652e2edb1763181f4b71e18b250f36d892a9c39fa488726adaf13a1f5cc22884.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\652e2edb1763181f4b71e18b250f36d892a9c39fa488726adaf13a1f5cc22884.dll,#1
      2⤵
        PID:3804

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3804-132-0x0000000000000000-mapping.dmp