Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2023, 18:35

General

  • Target

    9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll

  • Size

    176KB

  • MD5

    a7c7dc15d84b0807fe266ddac5838647

  • SHA1

    b249e546ed2f33479b10d4b7a993f263b4c8c459

  • SHA256

    9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35

  • SHA512

    779ebc3dac7c594d5fd3b193d4756a1dae8e509118522b56970ae018b4152874d032a252604c002f39d4eb8eef147d51383f581842b3f9c8c3d56e1290b82cec

  • SSDEEP

    3072:PdSxX46ho8GNBCFFEZX8YDt6PJmcy1jxNkczzyBzjoTl9jAF2:lSOERxEt8/Ic4jx6qzyx2

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll,#1
      2⤵
        PID:1484

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1484-133-0x0000000010000000-0x000000001003B000-memory.dmp

      Filesize

      236KB