Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 19:22

General

  • Target

    aa0e161cddf34f319a69ecea4b7f1aaa35a2fd88d5c3540beece2cb370f0d435.dll

  • Size

    899KB

  • MD5

    7de457b3e2ad0bbdda41d066c012d087

  • SHA1

    1a1c1b6744790d5e4034621dafc534654ef0ba5b

  • SHA256

    aa0e161cddf34f319a69ecea4b7f1aaa35a2fd88d5c3540beece2cb370f0d435

  • SHA512

    9c399f043fd944e4af892dd6a8c11b13cca7e1af16d17ff31708d5374b41ed0c235e5e4c0a29a02a1013e3ec7a616cd1dd64c77e4f80f1ba942e84535e925f45

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXh:7wqd87Vh

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa0e161cddf34f319a69ecea4b7f1aaa35a2fd88d5c3540beece2cb370f0d435.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa0e161cddf34f319a69ecea4b7f1aaa35a2fd88d5c3540beece2cb370f0d435.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:3772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads