Analysis

  • max time kernel
    181s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 12:56

General

  • Target

    8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll

  • Size

    96KB

  • MD5

    67e1f4480a1154c054f3ec8c8f250820

  • SHA1

    24af03a1a46aac8d1f9b00008f4e2c7702d2cdb1

  • SHA256

    8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067

  • SHA512

    8d405c206ff3eec7f9ee7e1b8d1620b1295537dbc7e86f717fa736ef9c0ca47e06617469c7668be887f0d70e38c4486305e17b42030242298e7d1304be28316e

  • SSDEEP

    1536:jB7EgYTbYQrlQd9qBIxrztLikOloMG4dUVZIHZyOcsTXBvGCY6:ttKrlQd4BI5hLiZlof4SZ6Y+R

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll,#1
      2⤵
        PID:852

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/852-133-0x0000000002A20000-0x0000000002A2E000-memory.dmp

            Filesize

            56KB

          • memory/852-137-0x0000000002A20000-0x0000000002A2E000-memory.dmp

            Filesize

            56KB

          • memory/852-136-0x0000000002A20000-0x0000000002A2E000-memory.dmp

            Filesize

            56KB

          • memory/852-138-0x0000000002A27000-0x0000000002A2D000-memory.dmp

            Filesize

            24KB

          • memory/852-139-0x0000000002A21000-0x0000000002A27000-memory.dmp

            Filesize

            24KB