Analysis

  • max time kernel
    138s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2023, 15:26

General

  • Target

    f47d708a61d7b6888032787b59869eacb0202420368401c2a5f9f2962fa8dc10.dll

  • Size

    226KB

  • MD5

    6683a214b74471688f1d79eda6a592da

  • SHA1

    b8ed23e209636264e0ce975a1438d71f690866e4

  • SHA256

    f47d708a61d7b6888032787b59869eacb0202420368401c2a5f9f2962fa8dc10

  • SHA512

    8758351c0a3de7b2ef9cf22a4106c0e2568dec78f8e9690a8f3fc572c364d2db18ab97aac04acc9d1391b167965f59bc227270b37a83950de5c7e69efc044f73

  • SSDEEP

    3072:+wV+9L94S4nJ+Yt42Cnk9lttlAxEWDRZn1gBl3GpeMdv+LJ74GfaombO:p0y4o93jAxEWv1gmpM/6

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f47d708a61d7b6888032787b59869eacb0202420368401c2a5f9f2962fa8dc10.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f47d708a61d7b6888032787b59869eacb0202420368401c2a5f9f2962fa8dc10.dll,#1
      2⤵
        PID:3736

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3736-133-0x00000000007F0000-0x000000000082E000-memory.dmp

      Filesize

      248KB