Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2023 02:22

General

  • Target

    8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll

  • Size

    3.0MB

  • MD5

    b32ab8e562f848e707c81bd00d04bed8

  • SHA1

    b03babef7344c4bb0ead84ae1fc7e256f0135d89

  • SHA256

    8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1

  • SHA512

    a3bb1a2fa5dc1eb2fe363a3ef9aadbf596e9b0f15560928e996a9df0dd00f8622074ebd29d4b292253bd0eac2b9165d9f097dcbbdb6ddf4881d0e4c93b62fe6b

  • SSDEEP

    49152:2vYjpCOCQdLzdHxI5ByzNaHjHrG3Namlhv24rQX9xe:3VCOCgXdS4zuYTu8uP

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8072304b3599d318454a1487c64d08219d3159224abc74331bf5a198b805f7a1.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-0-0x0000000010000000-0x000000001034B000-memory.dmp

    Filesize

    3.3MB

  • memory/316-1-0x0000000010000000-0x000000001034B000-memory.dmp

    Filesize

    3.3MB