Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2023 11:52

General

  • Target

    82ba6a3b27e54f9a86258a4322b6b09a53e08fb6e36a27c34cf505a9e5a55eed.dll

  • Size

    899KB

  • MD5

    1d533a86b341dada57b8b9da26f887c2

  • SHA1

    a69ed7f6c7afb18d60606bf3e4209b395659c9ba

  • SHA256

    82ba6a3b27e54f9a86258a4322b6b09a53e08fb6e36a27c34cf505a9e5a55eed

  • SHA512

    ee51d59303cca506220dc58acd3be65d8f9e781d0d9aaca907286ee4a64d9b990b75804b0747e4e50db9d5b658df2bbfa3284e6308dc4d0f98a07e6d48dee2d1

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX8:7wqd87V8

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\82ba6a3b27e54f9a86258a4322b6b09a53e08fb6e36a27c34cf505a9e5a55eed.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\82ba6a3b27e54f9a86258a4322b6b09a53e08fb6e36a27c34cf505a9e5a55eed.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads