Analysis

  • max time kernel
    139s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 22:11

General

  • Target

    6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll

  • Size

    49KB

  • MD5

    a6f4313bb9d2e20b8879cb32ff6e9b6b

  • SHA1

    48d1298c5d01498f5a46b955c3b70a16086a0895

  • SHA256

    6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716

  • SHA512

    dc28c5ddcdb1d3693058f384272f6884880a1f1b6cafdc11bd0cfac305faa5be8120e723dd7d65590d1c4ff550b448b39c859dc821e09ccc3d2363bd3cc0eb56

  • SSDEEP

    1536:CDwMsml26T5zBj+alf1H9jfbyqkY4ZvoDUb/gJORJYHB9ElHS:Cn7zBjPp1H9ovoDa/gJCJYHBWZS

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:4092

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads