Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 20:11

General

  • Target

    3dc5cc9af811c1ebb9f561051fd74d19.dll

  • Size

    561KB

  • MD5

    3dc5cc9af811c1ebb9f561051fd74d19

  • SHA1

    ac03ef24496ffd0ebc5178f075791aca9baa912d

  • SHA256

    16f3c2a7d9d9a12f55d5e2600a6c2eab4e1e32514cbfdd2b29da793e11f8a6a0

  • SHA512

    71d2b98a81adba945eae8267faadd65cbddd7a353d407d8166ffc4487c8eafeae01bc3b756d8c6410bf48388011148323f10c45f024b7e4f2f8dcd5abad1b9e6

  • SSDEEP

    12288:EyDOz9flmdUl3jQhLM9i2qvKV5KY7fLl2GdGO6Of:EvhEUZj8M5qCVUYzLl2GIe

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc5cc9af811c1ebb9f561051fd74d19.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    PID:3476
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc5cc9af811c1ebb9f561051fd74d19.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2568

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads