Analysis

  • max time kernel
    91s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2022 19:54

General

  • Target

    5d4d1b094c527ae6ec5cdf6895725358955da16a6f027509071b6795343eed7c.dll

  • Size

    3.8MB

  • MD5

    dec57a9660e546b917a4514425289e9d

  • SHA1

    759362876a553d20175e3829e990ae2047a80ff5

  • SHA256

    5d4d1b094c527ae6ec5cdf6895725358955da16a6f027509071b6795343eed7c

  • SHA512

    ca9224dab2698b56680130ea34e84f05a73d342a54ad8bf34c1de78fd4b551f602bd81335ad9be3e25350e5672867291eb08c9bd2929bffa1f8295c8ba9c5ad5

  • SSDEEP

    49152:EXe8ATCJjH6mOoRmqI28OXHfiChBk3MhIseqw1zYnwWP2yGvq:aGTCJjHsoRvI2RXHfrhBk38IRqw10l

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5d4d1b094c527ae6ec5cdf6895725358955da16a6f027509071b6795343eed7c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5d4d1b094c527ae6ec5cdf6895725358955da16a6f027509071b6795343eed7c.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads