Analysis

  • max time kernel
    58s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 19:42

General

  • Target

    1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll

  • Size

    64KB

  • MD5

    f351e1fcca0c4ea05fc44d15a17f8b36

  • SHA1

    7d36a6aa8cb6b504ee9213c200c831eb8d4ef26b

  • SHA256

    1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830

  • SHA512

    c139bddae3571cac3d832535e0c3bc6d817b86fb3f7b68864d1b94e9c37b38856f2eeeb49c16f2fb8fee45e6a7c95bc67072443b7428034b6def10d3f724ca22

  • SSDEEP

    768:edWOTdghGl7Lu/qGrN5r5UF9sBaho9S4AJKqBz8MZK8IgpkCamlniZfO:PGdghGleSGh5resN9S4A3jHaqniZfO

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll,#1
      2⤵
        PID:3960

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads