Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 04:11

General

  • Target

    ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll

  • Size

    2.6MB

  • MD5

    33caccc0d05ade349b17f60d60ef1521

  • SHA1

    0de6fbfce077db388080d78b4659b1d03209f2e6

  • SHA256

    ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914

  • SHA512

    619fb6ada2a6b45c63a20cd7819ba27b3f28a894306378f086989196822c87e1d50c980fb109abee872b1abaab6a1674c691a9d4cb89e44e6d0ace40cd75f181

  • SSDEEP

    49152:nVK4asaH2IFEAp+I4sZp9xkj+jYCTxWdhavRSl2rQp+hbvQPuQv:VhDxr9I4sZDxks1dv82a+SuS

Score
7/10

Malware Config

Signatures

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll,#1
      2⤵
        PID:4188

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4188-0-0x0000000074560000-0x0000000074C51000-memory.dmp

            Filesize

            6.9MB