Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 19:38

General

  • Target

    84910ef74bd312a0c65fe5378061a3f547fb4d6ec38ef1b5a87e605bce88ab49.dll

  • Size

    20KB

  • MD5

    9595ed613f1ab87287d69bd09ee05b4c

  • SHA1

    a09096e557f3ce824703f9c5f0122f5bb3580d3d

  • SHA256

    84910ef74bd312a0c65fe5378061a3f547fb4d6ec38ef1b5a87e605bce88ab49

  • SHA512

    a71aa1cde49790df0a61ccf209ff7bf134bdcf6d15108e0651a2d47c4ebcc3e5ea1a4902cab732d374772f10a1cdf56d6bf5383496f145600a971810224194b6

  • SSDEEP

    384:zSG/2Jp+C6QhtmruxCcdIL+0Xpl1CAu8UaWHuqaTlX0wG:zfYh2oCtpXP1x2OqaewG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\84910ef74bd312a0c65fe5378061a3f547fb4d6ec38ef1b5a87e605bce88ab49.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\84910ef74bd312a0c65fe5378061a3f547fb4d6ec38ef1b5a87e605bce88ab49.dll,#1
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1305.tmp

    Filesize

    20KB

    MD5

    cec5bea7f1113b44529fa94756222df2

    SHA1

    706189863d2f57a3a1aeb2e68f40543e64e34815

    SHA256

    f344e370d204cd19f4ed74e9afb6ecd4dd74e2d32fe606498d4f35aeb2eec8be

    SHA512

    fc9ebc6fac94d805fcd619a919194be23a3fd5a46a0b6ada7e0f1fe9a45f7fd6ae650c7699308eb0d9681f25d304933836c37154786242b4eab93b3893693107

  • memory/1672-55-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB