Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2023, 15:01

General

  • Target

    72eead975e48e26d44cf71398b30191e8c9d3cadf5baf32685575d1a4b76d930.dll

  • Size

    51KB

  • MD5

    3c52ddc0bf4bd5fff7347edb7d382666

  • SHA1

    3902f2666e9858a95a84a30b21d76ec3b1a9cc87

  • SHA256

    72eead975e48e26d44cf71398b30191e8c9d3cadf5baf32685575d1a4b76d930

  • SHA512

    e1b0dbbff20c1b33d355229587cb8a8092b83036c0074a645d8ca46dc0c8e99edbdc6d055b6840536b2773c20a550d304e9f2e2253599d1c23dbecb365469d03

  • SSDEEP

    768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezisAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBlpMC6H

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\72eead975e48e26d44cf71398b30191e8c9d3cadf5baf32685575d1a4b76d930.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\72eead975e48e26d44cf71398b30191e8c9d3cadf5baf32685575d1a4b76d930.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:3860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads