Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2023 20:05

General

  • Target

    a95090a4f36ea9c8d9d3c60ebffdb95463a720d0a90d1fbff16e25e738f7f2e8.dll

  • Size

    1.3MB

  • MD5

    5c8a4eb4ac05e2470334c2cadf39c1c4

  • SHA1

    87f872b8b62f8bf62fc3aedded17275c62850be8

  • SHA256

    a95090a4f36ea9c8d9d3c60ebffdb95463a720d0a90d1fbff16e25e738f7f2e8

  • SHA512

    d6ee2f9ae858ed4de2fc492ecdced033fa6b8ab053344cd90417f2538afd294c77c3a4ffb7d161a3d3466147b25072fed14689ce63623d64dab232d21c1810b8

  • SSDEEP

    24576:W2ijU4Be/srw2zABeob/EhoXdnRlreuvCQTJptkgtKlD980YDdj:WWOEBtAMn3FvCsL7tY+V

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a95090a4f36ea9c8d9d3c60ebffdb95463a720d0a90d1fbff16e25e738f7f2e8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a95090a4f36ea9c8d9d3c60ebffdb95463a720d0a90d1fbff16e25e738f7f2e8.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:3388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\OJ33QLSJ.htm

    Filesize

    377KB

    MD5

    0ac6c0891d32fbfdc75c86441b4bd402

    SHA1

    bc21b9a28846ff2c2cf93fed1a27cfd36c7842ca

    SHA256

    19373e845cc3736db43a670ae6a90f998d657f4761e555a181968d2f26734ba1

    SHA512

    978665a755a0267700626c3834132eaba3a78e254f96e26e5ab5ae24417eecad6e0fbc4716ccd28591e6e9b4bf52e71a8b5ebe28b9d32f08b99a9fccc738b153