Analysis

  • max time kernel
    103s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 08:02

General

  • Target

    a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll

  • Size

    640KB

  • MD5

    7aa066477603f55c439028e4de2e6642

  • SHA1

    f1eb56ac6094729776dd0c5efa80f01fccbd744d

  • SHA256

    a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45

  • SHA512

    d92c961577ad9ead86d4ce8b02a22a559a5346d5990edaad215046a6a1a4e4bbe3d4744e09c96488e194281e6e3d11bc9e7b236a49b31a3b3f3140a0320edb34

  • SSDEEP

    12288:QljQRl3iZwl3JBrySD9CkkgC28DWl0RJK2LgAN4c1DJ92trs1tTK3+uZ:Q9WZiZCCMCkkBRDeSjcjc1DJ92ts1tWJ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll,#1
      2⤵
        PID:4456

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads