Analysis

  • max time kernel
    133s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 10:37

General

  • Target

    79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll

  • Size

    8.7MB

  • MD5

    f1cde6a3091a1dac8a0fb5e95f78a418

  • SHA1

    2e52eb7da9f30b3153590f91f68a113a317a4660

  • SHA256

    79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8

  • SHA512

    1f44ecbdd4739bcf0dfb7e7440b3b360022a16fad0e364cb2684c20210bd771d3e0d9b11a42f96156af6f7f0cd3bd1a6a6496570677f18a377f90b7aac5ba9d2

  • SSDEEP

    196608:kH3dW2EbgSeKwInFCg0FAcASGnlxTSLhLojTWud4zgaefhfeY6Yy4FPZ:Y3dmFGFhPGnbTshLoGudQ/eZePYy45Z

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll,#1
      2⤵
        PID:396

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/396-0-0x0000000010000000-0x00000000108B1000-memory.dmp

      Filesize

      8.7MB