Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 04:33

General

  • Target

    73c73058b23a286bae1db6793221677dc82bf3422023bf3546a885effd76d2b8.dll

  • Size

    652KB

  • MD5

    ac3a1837d61529c1ce005742c4dd6afb

  • SHA1

    fbd3a5e7919f19f8fea02b05c985d4368d64ffa2

  • SHA256

    73c73058b23a286bae1db6793221677dc82bf3422023bf3546a885effd76d2b8

  • SHA512

    16a0a3db934c1792c5c9085beab1a69c8a0745c9a0e07bce0cd3d04d0fe3427f046f3a5c6fd636590d828c0d552b6832d302af41be0a53fecc2231f92704fa66

  • SSDEEP

    12288:EubwXEhbtOJztSGVVW3+DacYJf8nZd7ce9jmXDx93cmvFOlqZuCbCGa8FzyUnKjg:cXTSaW3+DacYJf8nZd7ce9jmXDx93cmX

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\73c73058b23a286bae1db6793221677dc82bf3422023bf3546a885effd76d2b8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\73c73058b23a286bae1db6793221677dc82bf3422023bf3546a885effd76d2b8.dll,#1
      2⤵
        PID:4956

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4956-0-0x0000000010000000-0x00000000101A5000-memory.dmp

      Filesize

      1.6MB