Analysis

  • max time kernel
    149s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 12:01

General

  • Target

    643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll

  • Size

    142KB

  • MD5

    a23fe0cd95fd358590d2bb681d277f9e

  • SHA1

    e48876d7beffd78e9d877892b29f35a45d28b159

  • SHA256

    643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84

  • SHA512

    ffd2762b49e26e4072a15d30de4f5eefe4843c8bb987dbcf2a617964f083da790b7fb958a60c46ad967c54dbd884c121b67e49e2bfe4bfba42431156c7b50a1d

  • SSDEEP

    3072:trPn1hcH98P67PBH2G3gFoh3H6J1vVjgQp3RpM1dpbQrQymzUOMgInmwuzqy/FEk:trP1hG98P67PNV3gih3H6J1VjgQp3RpO

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll,#1
      2⤵
        PID:4128

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads