Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2023, 07:49

General

  • Target

    8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll

  • Size

    213KB

  • MD5

    39b8039ee440a9c26a49c4931783de21

  • SHA1

    2775f20972a9d51e81982c5465f4b0c2adee68eb

  • SHA256

    8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275

  • SHA512

    826ee267b2664cea5a50c29c53d4c94591c233cea05f0ae7f8f4c9c091157038c37d140e6d96419fb56dbf221860c8cc4b66c16b6f2d3817763dfa0c3ab1b28f

  • SSDEEP

    3072:L5Np2dlUX0+Cx17F8QRJZKmOK3outKdpz7miJVD/mplcVigaY5mSEoDX:tFwT7SMJMzUoS+pzfbbmpJ/U

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll,#1
      2⤵
        PID:2128

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads