Analysis

  • max time kernel
    127s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2023, 03:31

General

  • Target

    06a4ba58eb68fad81cb727cb76f44b12abefd3b44224064dccfcb8cdea929c64.dll

  • Size

    3.4MB

  • MD5

    ae9ece20a4d15e754237301977d1d385

  • SHA1

    e30aa3a5a64f195e8bc83fc1930c2d0076d49dba

  • SHA256

    06a4ba58eb68fad81cb727cb76f44b12abefd3b44224064dccfcb8cdea929c64

  • SHA512

    7b45172c9ad630edd62af902948c5b51f3712b49f170d059e1cf3b509c64ff7c9dce5d4ddba2b556ecb8e70e9fdba1e287049cbf30eca431e87cd45a63812175

  • SSDEEP

    49152:4PSyiBkZTMRGIkBGCOmiNTvhvOBfvoq6qeC8bybBCZn2XkQSkR6CHhbM5ot2hKk+:4PSZBkaGnBGCOvJZgR6UC5ot2hKmJC

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\06a4ba58eb68fad81cb727cb76f44b12abefd3b44224064dccfcb8cdea929c64.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\06a4ba58eb68fad81cb727cb76f44b12abefd3b44224064dccfcb8cdea929c64.dll,#1
      2⤵
        PID:1608

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads