Analysis

  • max time kernel
    189s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 12:31

General

  • Target

    9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll

  • Size

    395KB

  • MD5

    02b1ac2a29f4d355df7a016d8b9c6076

  • SHA1

    f5ee4ca636cddd54f771c204f55ca458781c0dda

  • SHA256

    9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c

  • SHA512

    4d0bbe07ce6d8e4a3de3133c430d8e636794ad3c60df9bed9fb01da7b06dc50cf59de5edc4274e886c433f9d3f116e6a4fff8e7b4b02bad9b3a3376e3f0c699e

  • SSDEEP

    6144:7ph/Q6YKARvny3e0Bl7DezK1357ULz/hRMvc61oe8VWKt3mN6tbShMGLd:7pjY1nZOlGzK1357+tq7Kt3mNgbShM

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll,#1
      2⤵
        PID:2440

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads