Analysis

  • max time kernel
    295s
  • max time network
    368s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 04:35

General

  • Target

    dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll

  • Size

    1.2MB

  • MD5

    060bb618093684db155e3528315786d5

  • SHA1

    2ae1679e288e4feb300abf8d4deee39c71f5a502

  • SHA256

    dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7

  • SHA512

    913005d2396199aef82402d435172d92c514461363a32fbadbda0a32caf1aa91a1eba6d26841f0cdfaf42d8594e9ac6123be8ae55c26e5d9b8d0a6cc342d3c66

  • SSDEEP

    24576:iMIb0Zy9CbcEfV2jMotMDu0dAGly0vFV72daMHEoe8Bhx:iMm0+C4EBru0uGttV72daMHd1j

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll,#1
      2⤵
        PID:868

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/868-132-0x0000000000000000-mapping.dmp