Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 23:26

General

  • Target

    a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll

  • Size

    932KB

  • MD5

    c15f476f750976391271010d262f9cce

  • SHA1

    2970f5e3dc1f078f24b10467f5e7571417dabdb5

  • SHA256

    a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1

  • SHA512

    ac55cd502f8702bf4914d2a53734bfe02c2949a8e58165922796fa94b1ecbe4030587c081a1775868012cc3d9177a0235ffd46c8574a7d689a8e4de00f6aee19

  • SSDEEP

    12288:mROtmbqypDhkNlsV79scSfzTxWdpG15ygO/n2Tisea:m1bqy9hylY7/SSXP2Tisea

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a7c283c86edf64f78a4d77f903b499034b7c0d8cbaa9ed770300a52318a200c1.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads