Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-07-2024 22:18

General

  • Target

    9c3802707619b5b80f83af342b51937332067f5734ce8f0ca22da0b65024c267.dll

  • Size

    197KB

  • MD5

    a28a343bf59a539987b099e17044e9c2

  • SHA1

    d35b52f83bd2c660c8b1c71ede7f15a96141f082

  • SHA256

    9c3802707619b5b80f83af342b51937332067f5734ce8f0ca22da0b65024c267

  • SHA512

    6284a2611d3e483c1080815fca527d7bd9a34c76d0fe9093995a427658561b5cc56d44a2293047f25f2602e1bb6f78ae64541446a50d00f971ccca82c1c0884b

  • SSDEEP

    6144:qQyAEgVJFds8l9qaYP9B82JT7BP4efwoXOy:qQycVPzLqaEB82JTlP4kw

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9c3802707619b5b80f83af342b51937332067f5734ce8f0ca22da0b65024c267.dll,#1
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-0-0x00007FFB4FC70000-0x00007FFB4FCF6000-memory.dmp

    Filesize

    536KB

  • memory/2272-1-0x00007FFB4FC70000-0x00007FFB4FCF6000-memory.dmp

    Filesize

    536KB

  • memory/2272-2-0x00007FFB4FC70000-0x00007FFB4FCF6000-memory.dmp

    Filesize

    536KB