Analysis

  • max time kernel
    187s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 06:18

General

  • Target

    c6c7b4cc86cbd87827b15e7c7bff9430d325cdd956060875d763d0dc8524219d.dll

  • Size

    33KB

  • MD5

    537e0d7bad9da8a2818d530aba6e4ce0

  • SHA1

    36655871f9676ddc5973495e27085875ce3591ee

  • SHA256

    c6c7b4cc86cbd87827b15e7c7bff9430d325cdd956060875d763d0dc8524219d

  • SHA512

    49e425d9316a353561111423151d55534b926983ced0903b79928c9441dc38b0b2db626f8a3f5e29f7982a569212214f5c70451a1c1f63821b59fc8e52ce5506

  • SSDEEP

    384:wjg95Ar6n19NL9/1iN06md9eE4iUGKUInCxC6o77epQ+9CdbawYJFJ0CRM59PJ:PnAc/2IfZ4ZUInWo7cQkCphqDhR89PJ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6c7b4cc86cbd87827b15e7c7bff9430d325cdd956060875d763d0dc8524219d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6c7b4cc86cbd87827b15e7c7bff9430d325cdd956060875d763d0dc8524219d.dll,#1
      2⤵
        PID:656

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads