Analysis

  • max time kernel
    124s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 16:37

General

  • Target

    bfaed94445d552bc96156ebad476a3fdd28d7f2131301a6e2413748b84ccf5eb.dll

  • Size

    616KB

  • MD5

    61e0d7389c3328268a358ac2d6c8bee1

  • SHA1

    af5f2a0cede5c7470fd261d134bae80a034a5e97

  • SHA256

    bfaed94445d552bc96156ebad476a3fdd28d7f2131301a6e2413748b84ccf5eb

  • SHA512

    1361530b82885af2f6a630e92041743bba02cc2df7e937a0bc423ab82ab4b7d403a2e7bd2336aa1dc82b96114a430316f047b39fe5287789184a09d53b6e1794

  • SSDEEP

    6144:txXMvGW7lhALqEHct2fQ+HURTYq5cM39ixMCbK+C6MrRQ9KuMj0:txYPALqE8sFvxtg6oQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bfaed94445d552bc96156ebad476a3fdd28d7f2131301a6e2413748b84ccf5eb.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bfaed94445d552bc96156ebad476a3fdd28d7f2131301a6e2413748b84ccf5eb.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1580

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads