Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 00:47

General

  • Target

    910d3f54d792c241c88b8a6d6824daa60d0fed583f358c53736f5bd624b402c9.dll

  • Size

    5KB

  • MD5

    edebdbe37d904bb442453f0068f891c0

  • SHA1

    c84e5874ae3307b0d52d08d73c573f5d6976c72f

  • SHA256

    910d3f54d792c241c88b8a6d6824daa60d0fed583f358c53736f5bd624b402c9

  • SHA512

    7e5d96614450db4e8c7ed34a7d1198132707142f7057be8b775041d9b2bf2a989eadf5908a05a87a4ed867726b217bfde5884747c2bfc9d8abcb5f76b3bae808

  • SSDEEP

    48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhw36rJr/a77JONSS876bebTlXFVn:nEY2RrF1eqwi4aQJwROVcc6F6nOT

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\910d3f54d792c241c88b8a6d6824daa60d0fed583f358c53736f5bd624b402c9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\910d3f54d792c241c88b8a6d6824daa60d0fed583f358c53736f5bd624b402c9.dll,#1
      2⤵
        PID:1224

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1224-55-0x0000000076711000-0x0000000076713000-memory.dmp

      Filesize

      8KB