Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 00:37

General

  • Target

    ace6f51d8f56b08663ef3ae0db1a3ba2d9258507ce53ad9125966a4b5610c4b4.dll

  • Size

    64KB

  • MD5

    1bf87505f15944d4d652408199c10080

  • SHA1

    ec0321be9fdb5eac96b7828263bf91ade5ce1b65

  • SHA256

    ace6f51d8f56b08663ef3ae0db1a3ba2d9258507ce53ad9125966a4b5610c4b4

  • SHA512

    28b9204315db177018b27426fa3081df802de64697cea97980823db0688b9f2697c3e00f9d6b8e8e93c16c71870912033ffd09efb094cf9089e932b7e1edfc36

  • SSDEEP

    1536:IUC8xxUbcB+hx8UGUKRQRtAUUc7eXU8SyqP867npFKEUs4KCw2xt:rxuA2mUzRRt1UcKkfTbpFKjGfwt

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ace6f51d8f56b08663ef3ae0db1a3ba2d9258507ce53ad9125966a4b5610c4b4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ace6f51d8f56b08663ef3ae0db1a3ba2d9258507ce53ad9125966a4b5610c4b4.dll,#1
      2⤵
        PID:1488

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1488-54-0x0000000000000000-mapping.dmp

    • memory/1488-55-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

      Filesize

      8KB