Analysis

  • max time kernel
    173s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 06:52

General

  • Target

    a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll

  • Size

    68KB

  • MD5

    0b2745544d7312cc003c9247f458b530

  • SHA1

    484b11c027c4c82215b40d85eba7c1fb08fcb135

  • SHA256

    a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647

  • SHA512

    82cbb3e03261a962948844b8628c85d64afee5b101de0bbb99e6170c6acfafe2fa6596999e844c26fcd15b45bf6185a4f70c22c47f2a3b76fcbc4cb6c8496496

  • SSDEEP

    1536:Gxjhju/TegrK+gi0w+GtvndJrHNxp3G567qz+/+4OG8Fjw+OY3:GRJu7XOMtPdJrHNreqm4hyhn

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d2eb97eff62cf431666c7412c865ad73f5fcc65f6ed1e9e8cc44fe8739b647.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:1472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1472-132-0x0000000000000000-mapping.dmp

  • memory/1472-133-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/1472-134-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/1472-135-0x0000000002540000-0x00000000025D0000-memory.dmp

    Filesize

    576KB