Analysis

  • max time kernel
    132s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 17:56

General

  • Target

    648fae4b43e3a0d3e2bd9263a3c20c6da39bcf896a6104c1db0e5cfb1536fe7e.dll

  • Size

    5.8MB

  • MD5

    f878eed778d98c82fc9aceb0d5895cec

  • SHA1

    67336a7960c1ebfef2f508c58fdd062f0b433de2

  • SHA256

    648fae4b43e3a0d3e2bd9263a3c20c6da39bcf896a6104c1db0e5cfb1536fe7e

  • SHA512

    be5eaeb94ef0278eed8dc36e82b618cb8c1a7f3130dab13ce415dc2fec87e850ef9674b0842452203ec7969dd95543fa893ea075a4bf7cb50e969218c8538ff2

  • SSDEEP

    98304:ejBmUUISmN4rmekVphp0pMZSmxoJInLPxZccKjswARGa++0MD32EEXfK3isUghwm:OBm+ZYPkVph22ZNw0pZccYDaOFEEvKSe

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\648fae4b43e3a0d3e2bd9263a3c20c6da39bcf896a6104c1db0e5cfb1536fe7e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\648fae4b43e3a0d3e2bd9263a3c20c6da39bcf896a6104c1db0e5cfb1536fe7e.dll,#1
      2⤵
        PID:4168

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads