Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 05:14

General

  • Target

    f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll

  • Size

    81KB

  • MD5

    5014944d890003433d964e60dc04f74c

  • SHA1

    24194662d5298b33cb6ba6458b8c2284ada3088e

  • SHA256

    f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f

  • SHA512

    157d5fc46e90f098bf602d47b2f2ffee97aa476db5427e8ff59bf01fe5e2e080594c13297a89a9bf009b0467f6d5f0de2b85d47b020bc9d4492eeeae3be76a25

  • SSDEEP

    1536:utByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8WX:u4v4JKXTx71w0ArSsXF3enq8WX

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll,#1
      2⤵
        PID:3644

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads