Analysis

  • max time kernel
    308s
  • max time network
    378s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 18:26

General

  • Target

    PROPAMAT/FlDTEImpresion.dll

  • Size

    67KB

  • MD5

    3596d65a053a74ee3f622110a3abd36b

  • SHA1

    3c4dd978849931f997aad41d939f991dde9faa76

  • SHA256

    092f8b03ea8dd425b07339c2d750c41c85855d1e4c333bc8f71e3c352cc15246

  • SHA512

    7ed85c8f57d70152e37be55c94a4c2c6d8fcabb6a13f534e7d98adfe49ed2be62c4f0cbaa7afeb550909c1baee11269d5892fd97d2b45885c54fa57d1a32ae48

  • SSDEEP

    768:7nLA/nkNFl4nOfVJDesu8iDWg7FccKptitPq:zLUnkNFG8VJDeWiqGKptitPq

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\PROPAMAT\FlDTEImpresion.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\PROPAMAT\FlDTEImpresion.dll,#1
      2⤵
        PID:1116

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads