Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:39

General

  • Target

    6f7d9c6f05de0f24f0d3e26bdc5d3f2d6e59bf6a1ea3eff6670fabe60899d550.dll

  • Size

    862KB

  • MD5

    5406a3415c61f9ffebd290234021e750

  • SHA1

    5d03b07c4b760e03123c99ee78d199c39efafcf5

  • SHA256

    6f7d9c6f05de0f24f0d3e26bdc5d3f2d6e59bf6a1ea3eff6670fabe60899d550

  • SHA512

    6041b5bf1bd05c2d0be8b9d99ec8c068274c5d854193cd1a3d9bb2544a45cdd8fe87bdb8c4291307ff3a83890ed42572ddfa1985b9ed745fd296da6d3dfdd5c3

  • SSDEEP

    12288:cbxMQ0Ta1r4TGup9LKPi4jgUtxA4EvGeEPhlEFXLIQ3v5ZFLS5t4v2CDGmPok6:cslgxA4EvG5PhlExLNrFLS5t4eCD3od

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6f7d9c6f05de0f24f0d3e26bdc5d3f2d6e59bf6a1ea3eff6670fabe60899d550.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6f7d9c6f05de0f24f0d3e26bdc5d3f2d6e59bf6a1ea3eff6670fabe60899d550.dll,#1
      2⤵
        PID:1836

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads