Analysis

  • max time kernel
    150s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 21:41

General

  • Target

    872c07880c413dc4c81f6e7bef3ca29ce032a76c5ff2a4f4f24106e1eb58797f.dll

  • Size

    10KB

  • MD5

    5e02d55ed9074fa12023fe121040dd24

  • SHA1

    120cdf607f972fcf6719ccb6053ab6617714cb3d

  • SHA256

    872c07880c413dc4c81f6e7bef3ca29ce032a76c5ff2a4f4f24106e1eb58797f

  • SHA512

    68a1f4fdaad34d26ffa8295677b3aa8130cc3568c39e50e570563a543e5ab37c932b0221f26dd9ed6f575b19ed0f9e7ed8a8f79c6de4b79586a4940c0310d3c0

  • SSDEEP

    192:qDLw8dHabRDEgtHyl0NSypWak6HVdW3yWak8QjdW3w9wb:kldHad/N20IypWak8dWiWak8EdWx

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\872c07880c413dc4c81f6e7bef3ca29ce032a76c5ff2a4f4f24106e1eb58797f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\872c07880c413dc4c81f6e7bef3ca29ce032a76c5ff2a4f4f24106e1eb58797f.dll,#1
      2⤵
        PID:4980

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4980-133-0x000000006D991000-0x000000006D993000-memory.dmp

      Filesize

      8KB

    • memory/4980-134-0x000000006D990000-0x000000006D997000-memory.dmp

      Filesize

      28KB