Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 16:48

General

  • Target

    20cbe6ee8b78268684a62361ad12cdb6c925be82ab649a67d4d3a01ee5aaf35a.dll

  • Size

    899KB

  • MD5

    58517cf7a5e4f7312e26bc1ff72f9db9

  • SHA1

    d4cd522d7c8582de5e34ecc144f8e595721d5f4d

  • SHA256

    20cbe6ee8b78268684a62361ad12cdb6c925be82ab649a67d4d3a01ee5aaf35a

  • SHA512

    0935e4b89bdb95cecc13d87c7d1b767517405744e6309ef670234d4a18b6655c73ce71f0b3ea75918180df89dcb41dd5fa95d3de8a075f925d7f6443e30c0008

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXM:7wqd87VM

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\20cbe6ee8b78268684a62361ad12cdb6c925be82ab649a67d4d3a01ee5aaf35a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\20cbe6ee8b78268684a62361ad12cdb6c925be82ab649a67d4d3a01ee5aaf35a.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:4904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads