Analysis

  • max time kernel
    141s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 13:57

General

  • Target

    812ac9ea8d4e1ad86f4b23de86ca79a1b87984b8a6e7545937ceeec38ad4176f.dll

  • Size

    1.6MB

  • MD5

    72ce1cebea33b752eba5b1818a327fa1

  • SHA1

    3e62797bb354a6434c447125c6db64f40ec4b08f

  • SHA256

    812ac9ea8d4e1ad86f4b23de86ca79a1b87984b8a6e7545937ceeec38ad4176f

  • SHA512

    c8d160853d886c1034dc65fc66b2b1fcd84c9674a60dccde56bd89c27c77fd5e37b1364aed97f6f275b243b9e9cf2c6bdec85b2ba833900f8d860ad4b322dc88

  • SSDEEP

    24576:pf0kSJv4ncRKZ0WuC6M8SzUn8uMUEypME8ZTHo4iUlUR:pskxWIuC6OGzEypMlTJyR

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\812ac9ea8d4e1ad86f4b23de86ca79a1b87984b8a6e7545937ceeec38ad4176f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\812ac9ea8d4e1ad86f4b23de86ca79a1b87984b8a6e7545937ceeec38ad4176f.dll,#1
      2⤵
        PID:2028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2028-0-0x0000000075010000-0x0000000075251000-memory.dmp

      Filesize

      2.3MB