Analysis

  • max time kernel
    91s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2023, 11:40

General

  • Target

    9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll

  • Size

    198KB

  • MD5

    e03e0ad2ff468fa1e60208c02b0fdcbe

  • SHA1

    9b016abeff78a525edecb3e9af6c538eb1e62f82

  • SHA256

    9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398

  • SHA512

    0d0812a403b2cbd8aa88691c3f386dbd5aeb7a1cb43db59931cbb1a3580f7d437fad785e09cd7a4067a287ecbf0580fd4ca95ec4e64dacebc75ec911d1683fee

  • SSDEEP

    3072:S1l3qN5xLIjfkQmwngYJG5HcKviUa41IUrQZ5sPA79OMQaWy/:Sn3qN50kQfJG5HcKpIWQZ5sPAOMQa

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll,#1
      2⤵
        PID:3296

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads