Analysis

  • max time kernel
    136s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2023, 04:49

General

  • Target

    b6bfdf4b029cbd53b3bc6bcc1910c390499407c383f491db2a57d79d2a8e4340.dll

  • Size

    899KB

  • MD5

    2fd9df78f6f0d985b3d4a47ee53ec93e

  • SHA1

    aea545f9adff1511d6be428dbf1e2d883819bb1e

  • SHA256

    b6bfdf4b029cbd53b3bc6bcc1910c390499407c383f491db2a57d79d2a8e4340

  • SHA512

    f1df0d0160159c70217a6faf407ee9acdedfda2cc8b74056231906f6455aea45dd2d48f6f93a4cbc989aed7b110261e4ee9e4a120334a6296d370f4dcefb69f2

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXK:7wqd87VK

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6bfdf4b029cbd53b3bc6bcc1910c390499407c383f491db2a57d79d2a8e4340.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6bfdf4b029cbd53b3bc6bcc1910c390499407c383f491db2a57d79d2a8e4340.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2032

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads