Analysis

  • max time kernel
    93s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 00:08

General

  • Target

    eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll

  • Size

    15KB

  • MD5

    03aad2cf835bef96122d12cf5efea7db

  • SHA1

    432124ff2ae9c67d0c613b8b5e6017865bcbc7db

  • SHA256

    eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743

  • SHA512

    d143728caca4ad54cf87eeda811d4e02275a453a1916a8dd6753cd1780e5010325bc4de4149b4ec4908f1ef69968ae7950c886252e0defbd908d5f30b53b585a

  • SSDEEP

    384:GyF4aDNep0gyc3ADFnWtl4wHmDAX+sjSAEtI:afINAWD9sdEt

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      PID:4124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll

    Filesize

    65KB

    MD5

    c70a84ed1327bde255433456da06b2ce

    SHA1

    000d3f57d89dbc478ccf17f381ac34501a9718d8

    SHA256

    6b4f666b24e1fd048c96693d63b09d65decbaa82e836f0aa6b334f095fa6397c

    SHA512

    eda417020539bae6d661d38b2a9d3aa7fd3ab48347c40716bddf9d83af2c2f7d9b12f634730c0e69a0117158651fd3b6ac6e631f1185de3b9655ee8ca9567078

  • memory/4124-1-0x0000000002B30000-0x0000000002B31000-memory.dmp

    Filesize

    4KB