Analysis

  • max time kernel
    136s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 02:50

General

  • Target

    4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll

  • Size

    3.3MB

  • MD5

    24d8df1c0873dbdf39c2f216d939a865

  • SHA1

    83f2ad097fac58e47fa2abdbbd207a3236526997

  • SHA256

    4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889

  • SHA512

    8dc83754064606eb70ddaa093ca9f85b4f290fd7ac0c324f3991fd12ff63a29bbb8972c0579d3b639dd8cfd6bed2d8d98f47421f6bacdaf5600d4937d8d5c306

  • SSDEEP

    98304:wi+Bp0bTP47UX6L5FyVPFvW3tQgOqQPKSI+oj9ghi1RebMIg9Cbk/V8aO+R80UmL:opl7R5lugOqQPtojDIg9Cbk/V8+

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll,#1
      2⤵
        PID:4724

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads