Analysis

  • max time kernel
    140s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 13:45

General

  • Target

    e2d5851a7d79eaf9b386517b5e1a51b2249c476c1f3c5f0ab1df972ae2142527.dll

  • Size

    2.3MB

  • MD5

    64beb0e4bedbb0f0f12006182f90d809

  • SHA1

    847fba5565d3fc051e758fbcdd5cf015e41f0e10

  • SHA256

    e2d5851a7d79eaf9b386517b5e1a51b2249c476c1f3c5f0ab1df972ae2142527

  • SHA512

    862b4037cecb59d1e83aedc6ecc2095e51c016db61fa6fae0a506bd69b165fe7ed399993a8e83b9a60c36ccf040003f51f0d956b91f6e2e0ab3be3355b97ef0e

  • SSDEEP

    49152:eTmaUaskk/0Y8YjZaCw/cYKnfsI3CNxyFocTTzpu4/p:5accY8AAb/nyfsI3cx5cTTzpu4

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d5851a7d79eaf9b386517b5e1a51b2249c476c1f3c5f0ab1df972ae2142527.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d5851a7d79eaf9b386517b5e1a51b2249c476c1f3c5f0ab1df972ae2142527.dll,#1
      2⤵
        PID:4948

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads