Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2023, 08:48

General

  • Target

    7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b.dll

  • Size

    22KB

  • MD5

    5e1389b494edc86e17ff1783ed6b9d37

  • SHA1

    fa71d067f8187a023334c5503e66fd9be2b73698

  • SHA256

    7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b

  • SHA512

    b1336d99c1dea80f6b668b69319230c7bb8d77070357715bbbd613ea374c8a03c3e06ebbc9eb69069623a18ae441b3689f971cddb79350ac1c3eba4a7c9462ea

  • SSDEEP

    384:Zdxj2o0egNkLmKIVHSaGKHQr+AXMC9VxBKFs02kE70JOUo45VRVqlBqfA:Zn2o0oyHBGKHTAcCsmV10JtRV

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    PID:2340

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2340-133-0x0000014D07820000-0x0000014D07821000-memory.dmp

          Filesize

          4KB

        • memory/2340-140-0x00007FFD63140000-0x00007FFD6315E000-memory.dmp

          Filesize

          120KB