Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 11:25

General

  • Target

    6aa22f86eebe907fd68ab25ae3f3478e.dll

  • Size

    144KB

  • MD5

    6aa22f86eebe907fd68ab25ae3f3478e

  • SHA1

    13a3d6ffecc17ca2f1abe77ff805dcedf824da10

  • SHA256

    55c8c6843b9bb0049b94c15bf62184c3e6bfc0d5c72fe874d3286de3e7d2b943

  • SHA512

    c5c1d59579e3c7dee1d54cba8e1684bef8bdddc5c7b4609627d0aef1975031461bacf996d8227fc30b904c7a2ebeb33933dfc1c9274d02ec39614d800f94ed5e

  • SSDEEP

    3072:YSftpNluLXUzH+Q99mMuD4rrj/ngHYkLF5K:YS3joMH5I2TKYu8

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6aa22f86eebe907fd68ab25ae3f3478e.dll,#1
    1⤵
      PID:788
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6aa22f86eebe907fd68ab25ae3f3478e.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3188

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/788-0-0x00000000003D0000-0x00000000003EA000-memory.dmp

            Filesize

            104KB

          • memory/788-1-0x00000000003D0000-0x00000000003EA000-memory.dmp

            Filesize

            104KB