Analysis

  • max time kernel
    147s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:52

General

  • Target

    23444a262be6d1f34e3f4107b880bb16.dll

  • Size

    4KB

  • MD5

    23444a262be6d1f34e3f4107b880bb16

  • SHA1

    42110c20c539a8968fb7946f4f4050a2088e2699

  • SHA256

    13f2983e0b5bc729d805097d1ac12e12f843a4683c07316c080e273cbf153e9e

  • SHA512

    253e2764dcbe94ec4f7ba28bda93777a8a01789f3439241f99ddd5fa0c4bf6fb9be81d2e6fa6d962a2428efa74e288b4058fa6bac88284cb975938f3d3e6f624

  • SSDEEP

    48:a5z4K+cmATmRYoRZCTJzJFvhMUcKbmBWOtgCB:MTWnRZ0lJFvhbu8+go

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\23444a262be6d1f34e3f4107b880bb16.dll,#1
    1⤵
      PID:4452
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\23444a262be6d1f34e3f4107b880bb16.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4940

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads