Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 10:43

General

  • Target

    181701598844df86db90ffc3636cb510.dll

  • Size

    10KB

  • MD5

    181701598844df86db90ffc3636cb510

  • SHA1

    02208d3abc1a9b972714cc88da9e98f061d7b5b4

  • SHA256

    d00363ec006f4ff44d2c74114c745633fbf1403d7c5b22d3edf075e80864694b

  • SHA512

    cd34ff11389261ebbe2c0016fa033672a3cbc6493a5044c0bd80a96d4fd5538ee5a99db759acb96b2f9ca4e122b4da7784c9ec4457a605e928c2494406ed31bf

  • SSDEEP

    96:h/EKVqTseipmRxbz2ewx8koiSI76bY3UK7K27cjbLZYfBBcsFo2YDTp:h/B+seYmRtDwx8k9g1OJcjJ4BcQto

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\181701598844df86db90ffc3636cb510.dll,#1
    1⤵
      PID:1640
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\181701598844df86db90ffc3636cb510.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3392

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads