Analysis

  • max time kernel
    210s
  • max time network
    228s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 20:22

General

  • Target

    d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll

  • Size

    56KB

  • MD5

    d33fc2c7968e99a5c1babdeff388ce4b

  • SHA1

    8f8e56cbabfabfcebf93fcf95e8f87969c86e235

  • SHA256

    d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac

  • SHA512

    99311d7b55f5b0b77342a277e708426ecc4abe13f4a114fbb098b0f33fa1f70d9c397d47f3171efcde1c634c2c3736c7a0ce1164d6f725a2e3e7d577a1671775

  • SSDEEP

    768:MbPCSzfg1FrY/jWWspqRogtS2gBFHQY25aKjB5l+NMBQX+OQ5iwuFQanKvMjDs:PSb//0pWQ2a25VqMuXhwOQafE

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll,#1
      2⤵
        PID:4816

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads