Analysis

  • max time kernel
    142s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 03:30

General

  • Target

    6099dd8d1b9b7e5abe5a7aa1790d3ae4d070a6486bf90c8eccc3e21638ffc6ef.dll

  • Size

    51KB

  • MD5

    78edc04a1c831003e58b169befb1e577

  • SHA1

    83fb776ca2cb0972bb232d427df3d87bc5d43ca9

  • SHA256

    6099dd8d1b9b7e5abe5a7aa1790d3ae4d070a6486bf90c8eccc3e21638ffc6ef

  • SHA512

    f6a793a64035f25eb49b12563fe61621f3cdc49003726ee7610e36fc246ba3692be7da5f7d3e98a9a1b519670c669a66e2ae328a008bf553c3d3e4c762692f29

  • SSDEEP

    1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLyJYH5:1dWubF3n9S91BF3fbo2JYH5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6099dd8d1b9b7e5abe5a7aa1790d3ae4d070a6486bf90c8eccc3e21638ffc6ef.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6099dd8d1b9b7e5abe5a7aa1790d3ae4d070a6486bf90c8eccc3e21638ffc6ef.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:3868

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads