Analysis

  • max time kernel
    186s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/10/2023, 04:47

General

  • Target

    0e1fa8b6b0b30c1b7e73f49d0060185b44304a31d93e10b7659bc756d9687935.dll

  • Size

    2.2MB

  • MD5

    f63ae5061bfcf1e4ed48aa6e9af08546

  • SHA1

    d00b2599bf013ce5e38ebc5f4a490c391e013600

  • SHA256

    0e1fa8b6b0b30c1b7e73f49d0060185b44304a31d93e10b7659bc756d9687935

  • SHA512

    287538c4000b7d33783c621eb89742e0f668b64a01e2bf623861f07a3e9ee9838b8737b9799f6dad6a2cf32af0ec9aeb5c058178af153ff51c8700e4dce16071

  • SSDEEP

    49152:vEcHRRntZqTraJz64F0ZGXPUC88MxGt9QEtXCYNEpH4oy:5yrwfF0ZGfPMxGME8Hf

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0e1fa8b6b0b30c1b7e73f49d0060185b44304a31d93e10b7659bc756d9687935.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0e1fa8b6b0b30c1b7e73f49d0060185b44304a31d93e10b7659bc756d9687935.dll,#1
      2⤵
        PID:4036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4036-0-0x0000000003040000-0x0000000003046000-memory.dmp

      Filesize

      24KB

    • memory/4036-1-0x0000000010000000-0x000000001023D000-memory.dmp

      Filesize

      2.2MB

    • memory/4036-4-0x0000000004C10000-0x0000000004D16000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-5-0x0000000004D20000-0x0000000004E0B000-memory.dmp

      Filesize

      940KB

    • memory/4036-6-0x0000000004D20000-0x0000000004E0B000-memory.dmp

      Filesize

      940KB

    • memory/4036-8-0x0000000004D20000-0x0000000004E0B000-memory.dmp

      Filesize

      940KB

    • memory/4036-9-0x0000000004D20000-0x0000000004E0B000-memory.dmp

      Filesize

      940KB