Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 03:58

General

  • Target

    27365b699bfcd505aa029ecabaf8ae72.dll

  • Size

    197KB

  • MD5

    27365b699bfcd505aa029ecabaf8ae72

  • SHA1

    b191b691fad6b53be214e18a262087f39f19e82d

  • SHA256

    8e6acd6e2442da216f35b54d5f2bb3401b04b78e0b8775156e7851ba3fe2b51c

  • SHA512

    6e7a444b65917dd025bdb148961428ad1bd085e28dfb0da7566b430a4357fef8e5ea791ba24b827ecf5b8be530cf8c1c2bf82c6852f0b629237b8aaf0e949741

  • SSDEEP

    3072:93Jc6lIefOyIcLSh/AEskn07ul3dlI3pVFALk8C1OBYcULtFgIRu2QDkjdAl:954eIcLULswDlTIZw48CUlULtFbYDkR

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\27365b699bfcd505aa029ecabaf8ae72.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\27365b699bfcd505aa029ecabaf8ae72.dll,#1
      2⤵
      • Drops file in Program Files directory
      PID:4408

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4408-0-0x0000000010000000-0x0000000010035000-memory.dmp

          Filesize

          212KB

        • memory/4408-1-0x0000000010000000-0x0000000010035000-memory.dmp

          Filesize

          212KB

        • memory/4408-2-0x0000000010000000-0x0000000010035000-memory.dmp

          Filesize

          212KB

        • memory/4408-3-0x0000000000E40000-0x0000000000E45000-memory.dmp

          Filesize

          20KB

        • memory/4408-4-0x0000000000F20000-0x0000000000F45000-memory.dmp

          Filesize

          148KB

        • memory/4408-5-0x0000000000E40000-0x0000000000E45000-memory.dmp

          Filesize

          20KB

        • memory/4408-6-0x0000000000F20000-0x0000000000F45000-memory.dmp

          Filesize

          148KB

        • memory/4408-7-0x0000000000F20000-0x0000000000F45000-memory.dmp

          Filesize

          148KB