Analysis

  • max time kernel
    139s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 04:25

General

  • Target

    f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll

  • Size

    110KB

  • MD5

    1cbeb5748780f406a3040d50ed265840

  • SHA1

    0b9d5d93f23db099a483a3ad3d464163141ab98f

  • SHA256

    f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0

  • SHA512

    7bacb7675ac5911eaa235bf4bf6c60cd0c296fd4f521cc3c9d97df26a8283eadcd3417711b7d5002b52712fde0ac5c19e2d209eeb0c6036142ff663f45a1ee7f

  • SSDEEP

    3072:hHzxut/Uav1Mgmy73P9AiF7PG4+lanj/FwYRM:GtM61D7YajFwYRM

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll,#1
      2⤵
        PID:1280

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads