Analysis

  • max time kernel
    22s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 16:27

General

  • Target

    cdc37839fb7aad898822c23299f6ef260d25049b1fb68dc2c086df65b87cee0c.dll

  • Size

    98KB

  • MD5

    2ee584433e30471f4c22950cb086a671

  • SHA1

    41b7fd409cc7ef53773b8ef332e7966b0d9032d3

  • SHA256

    cdc37839fb7aad898822c23299f6ef260d25049b1fb68dc2c086df65b87cee0c

  • SHA512

    50076ed512959a758c133069f59bab1ef6535da29e7a9463fa333e59f7d3e56685bde75558394b0032ec32e55b25d68e5e58bbc2d39952a56ecec213af54de4d

  • SSDEEP

    3072:R6sVz+kJdbIe1sssg42QZEqivZ+KTMuIgc39fqrVq:E3kJdbIe1sdgQZavZ+pzgcSq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cdc37839fb7aad898822c23299f6ef260d25049b1fb68dc2c086df65b87cee0c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cdc37839fb7aad898822c23299f6ef260d25049b1fb68dc2c086df65b87cee0c.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1884-55-0x0000000076941000-0x0000000076943000-memory.dmp

    Filesize

    8KB