Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 08:57

General

  • Target

    32f22168555f79d54239abcf83daf51a9c4e437c2319cbf3246af1593adb9119.dll

  • Size

    3.5MB

  • MD5

    70aa0dc3daae213a889703e51dd53ca1

  • SHA1

    0262cc4cb263c4243712be7d13cd684707685758

  • SHA256

    32f22168555f79d54239abcf83daf51a9c4e437c2319cbf3246af1593adb9119

  • SHA512

    d839a29b4885e6bcb49e102da63da1d624e69cfe757dea5600b51e13733b7856ba0a5f507904f19b4f178c2a30699f4eae070b27ec9454b95c23dbd7c7a63023

  • SSDEEP

    98304:fpv4bkd1vGvHaP/FHyZkbwE3zjFBPMwr7Grp+yMf1Oq:x4bq1vGPHksEjrN4p2Uq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\32f22168555f79d54239abcf83daf51a9c4e437c2319cbf3246af1593adb9119.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4384-0-0x00007FFEFA501000-0x00007FFEFA6FE000-memory.dmp

    Filesize

    2.0MB

  • memory/4384-2-0x00007FFEFA4E0000-0x00007FFEFAA7C000-memory.dmp

    Filesize

    5.6MB

  • memory/4384-1-0x00007FFF18530000-0x00007FFF18532000-memory.dmp

    Filesize

    8KB

  • memory/4384-5-0x00007FFEFA4E0000-0x00007FFEFAA7C000-memory.dmp

    Filesize

    5.6MB