Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 10:12

General

  • Target

    c443d2e265ee67c14b16dec62c6249cf578e6f8f879aa0d1890f3b04c0a9a3f6.dll

  • Size

    899KB

  • MD5

    74209bd8f9b9b0ea2441abf764ff0536

  • SHA1

    f5f8a1bea07a60aee58324b7fbd7b6f3cff7a160

  • SHA256

    c443d2e265ee67c14b16dec62c6249cf578e6f8f879aa0d1890f3b04c0a9a3f6

  • SHA512

    8f6e1390c12479cafd3b74d8f7f9f51b3ea439feb7a19947abda23568bd5be9d43dffaccde67cc94286d0987b08b3753093295187cd85ff90f6abd525ba51aea

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXO:7wqd87VO

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c443d2e265ee67c14b16dec62c6249cf578e6f8f879aa0d1890f3b04c0a9a3f6.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c443d2e265ee67c14b16dec62c6249cf578e6f8f879aa0d1890f3b04c0a9a3f6.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:4404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads