Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2023 12:38

General

  • Target

    6d7166d3f7b0b5fb6eff764245e0abc198a4bbae90fe3f43ab01633a5a71bae9.dll

  • Size

    2.0MB

  • MD5

    f97ed8a7b87e0825f7abb189b6763f9f

  • SHA1

    36a2cf2c1f32e1dcb299441b898b15b326f4491a

  • SHA256

    6d7166d3f7b0b5fb6eff764245e0abc198a4bbae90fe3f43ab01633a5a71bae9

  • SHA512

    5304f16047316b84b8c001b69e1a417f4dc8d04d3bed5becefcd41b90526acab7888450df4d9d6332b336e634ab841141a2c463ca8ceb76bc08dfea279da8ac9

  • SSDEEP

    49152:Xo2lVV1wD1JaBEGw6nPx0ejXbXPOXsptKiPD5Zqd64jVXehlY4+BF4u:PVV2D1J7Gw6fjXE6Ed7jlehlY4+BF4u

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6d7166d3f7b0b5fb6eff764245e0abc198a4bbae90fe3f43ab01633a5a71bae9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6d7166d3f7b0b5fb6eff764245e0abc198a4bbae90fe3f43ab01633a5a71bae9.dll,#1
      2⤵
        PID:5060

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5060-0-0x0000000000C70000-0x0000000000E80000-memory.dmp

      Filesize

      2.1MB