Analysis

  • max time kernel
    68s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 20:29

General

  • Target

    c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll

  • Size

    62KB

  • MD5

    88cb08d0a2f66985442b9622939de611

  • SHA1

    2b71e61986475f5b8b9f6b7197412d5139bf9196

  • SHA256

    c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306

  • SHA512

    076bd21acec8c91c27900204c19746671f2e25589c927b9317454e56d60c7a0866d4ef975db0823b07f48735cf1e4cfd5966cf488fcd19b507d7d24fc730d52c

  • SSDEEP

    1536:OsuX6JN3TSdK0KaktcDIgG/YT8OeeyDPoQvfEv:1/bAtktcUgGgT8OPIAQHEv

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3472
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll,#1
      2⤵
        PID:2032

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2032-132-0x0000000000000000-mapping.dmp