Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 14:56

General

  • Target

    b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll

  • Size

    899KB

  • MD5

    4df197d2287112a2b5ce26b1aa3862b6

  • SHA1

    df63aec00c57ff5b5a0a04c40a9ba8b6cbf515e3

  • SHA256

    b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2

  • SHA512

    16b8df24dfb79c0bf23e7840f88248cd9956887cf5c6d5515a3cebf76a6c46102f2477d9693ef9db83b2dad318da0278d1ff6b944c68cb62dc396b1d4ba605e6

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXZ:7wqd87VZ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:5100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads