Analysis

  • max time kernel
    93s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 18:32

General

  • Target

    3e6cc19c7fc9f890fb36e133980f341379dac1da7db118ed95ca5807f9d20a08.dll

  • Size

    3.5MB

  • MD5

    28088a4999a23c6f58a579851db01ba3

  • SHA1

    0424f6176cb4c848af8319dbade1762af769e4b0

  • SHA256

    3e6cc19c7fc9f890fb36e133980f341379dac1da7db118ed95ca5807f9d20a08

  • SHA512

    16b7280833b15697b0e029c36195103f2e39a6b13f2774149179660fa50f4b3fa4731790f76df6a7bb92f455126badee584b8b97ba91357c834df18bc3bc0e77

  • SSDEEP

    49152:1m9HeH4FtP460/Igc9F3eKozoBkwAYwlNUdh12MZXHBSn+YmW4O3m7cjmMQTC+zj:8QKotcTlBk9YwzEhPbYzjmMtccXk8KH

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3e6cc19c7fc9f890fb36e133980f341379dac1da7db118ed95ca5807f9d20a08.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4456

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4456-0-0x00007FFE70E43000-0x00007FFE71042000-memory.dmp

          Filesize

          2.0MB

        • memory/4456-1-0x00007FFE8EBD0000-0x00007FFE8EBD2000-memory.dmp

          Filesize

          8KB

        • memory/4456-2-0x00007FFE70E20000-0x00007FFE713C8000-memory.dmp

          Filesize

          5.7MB

        • memory/4456-5-0x00007FFE70E20000-0x00007FFE713C8000-memory.dmp

          Filesize

          5.7MB