Analysis

  • max time kernel
    176s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 18:28

General

  • Target

    ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll

  • Size

    1.1MB

  • MD5

    b2455595f313196d657d3fb3899aca06

  • SHA1

    86a8417ea04ba510786e27f079e63e49c0bf75fa

  • SHA256

    ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088

  • SHA512

    9aed610603c0d2573ef67ddee1b3a9a626cf7fa12698ab0b598ed14a47b4cccaa32766257c1288cf48de124c54c5f8046350f2693057a4dbe01bdecfdec045cf

  • SSDEEP

    24576:yk7LVvVwiBeriy7c2XJ8V7Qe0phLToByOMK+5vqI:tciBsiy7cIJ6kJphXoByOBI

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ce6b910e82e4b5b55402d898bfc4f776117501a86f7958cf15dda119c0671088.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3304-132-0x0000000000000000-mapping.dmp

  • memory/3304-133-0x0000000010000000-0x00000000102C2000-memory.dmp

    Filesize

    2.8MB

  • memory/3304-134-0x0000000001350000-0x0000000001353000-memory.dmp

    Filesize

    12KB