Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 23:15

General

  • Target

    10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll

  • Size

    187KB

  • MD5

    23df8f78a98fb56da0dc436da5947fb4

  • SHA1

    31d29b5f60adee8394f2473cb464b97a6ab4179f

  • SHA256

    10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed

  • SHA512

    dfd61aba3bd1c25f1819f2675c2787a3e5f64c7c47c4c7717fb7e355e2dcd30c0360139c338aa5576f7f97acc4c6f0b69bbfe6ca67177c9edfa5fc712338d700

  • SSDEEP

    3072:ANwI/BnZSQgY7zJAW3mOKWa84x6BMylL4Lx22lQBV+UdE+rECWp7hK3jwXc:r+JdTmOK8S6BMylBV+UdvrEFp7hKz7

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll,#1
      2⤵
        PID:2652

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads