Analysis

  • max time kernel
    150s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 02:02

General

  • Target

    a17e0af2170dd4270fb9761433e933bcd5572c6557e87a136a4233d69c54b596.dll

  • Size

    229KB

  • MD5

    3ccd1b2ce12d680acc27386ca8ebff40

  • SHA1

    143a93a638304c10bf3fc65fc32dffa56c563415

  • SHA256

    a17e0af2170dd4270fb9761433e933bcd5572c6557e87a136a4233d69c54b596

  • SHA512

    095072be4f7ee20ed62a2571449ef0952233877476fba64f9708a4c5bf4459db6d012af904782ff8042932060e97c31abc24cb96e1338955450f0ca05bfe03f1

  • SSDEEP

    6144:R7FyV/bLBIG/VQvRh957/JFsOZQVS2ZEdgwwehJTRD9afKaO:RgV/bLBIG/VQvRh957/HVuEdgww4ljbp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a17e0af2170dd4270fb9761433e933bcd5572c6557e87a136a4233d69c54b596.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a17e0af2170dd4270fb9761433e933bcd5572c6557e87a136a4233d69c54b596.dll,#1
      2⤵
        PID:2532

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2532-133-0x0000000074EE0000-0x0000000074F1D000-memory.dmp

            Filesize

            244KB