Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 09:39

General

  • Target

    a18af44de4bab7b45928632af371800a.dll

  • Size

    29KB

  • MD5

    a18af44de4bab7b45928632af371800a

  • SHA1

    53ce11648eb0d52158fe25f44edf20acc40d6011

  • SHA256

    55651233717933794f21620e176f03592bfdd82403d21cafe09d99c858bdea1c

  • SHA512

    b8ab8d4ee91244d6279e3de2cf23e766f4e97e284228f14c8eaebc63dfa9cb0aad34c00a549e1597702481a87c14a609d951b73768f9eff023347153b63bdd89

  • SSDEEP

    768:uod+R0NVfKMDnroDdKQLilMmQFxDha5b:uA+R0LCM30dKOXmWA

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a18af44de4bab7b45928632af371800a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a18af44de4bab7b45928632af371800a.dll,#1
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1616

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1616-0-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/1616-1-0x0000000000F20000-0x0000000000F21000-memory.dmp

          Filesize

          4KB