Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 01:49

General

  • Target

    c99d73d78f1203c159ad6085af6df2e0N.dll

  • Size

    3.5MB

  • MD5

    c99d73d78f1203c159ad6085af6df2e0

  • SHA1

    30f1f56d25b62d31bfc52fd4d27ef1ecb14a1e57

  • SHA256

    f704b71af231ca1edbd81e0235f843557ffd86839c52998fffea49443791e058

  • SHA512

    94438181501f91cb0bbd9716f7b12877ad353171ca48426928a0b8487cb43dc0fb47c81146f879799e0716e64d5c9136d155979200b0fa8d33dcd0e490346cb2

  • SSDEEP

    49152:1m9HeH4FtP460/Igc9F3eKozoBkwAYwlNUdh12MZXHBSn+YmW4O3m7cjmMQTC+zh:8QKotcTlBk9YwzEhPbYzjmMtccXk8Kl

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c99d73d78f1203c159ad6085af6df2e0N.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4080

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4080-0-0x00007FFB61AB3000-0x00007FFB61CB2000-memory.dmp

          Filesize

          2.0MB

        • memory/4080-1-0x00007FFB7F790000-0x00007FFB7F792000-memory.dmp

          Filesize

          8KB

        • memory/4080-5-0x00007FFB61A90000-0x00007FFB62038000-memory.dmp

          Filesize

          5.7MB

        • memory/4080-2-0x00007FFB61A90000-0x00007FFB62038000-memory.dmp

          Filesize

          5.7MB