Analysis
-
max time kernel
11s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 11:17
Static task
static1
Behavioral task
behavioral1
Sample
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll
-
Size
207KB
-
MD5
f0d8f7721e584a2407bfb2563110fc5a
-
SHA1
d1cd10e44743b97edf5d18fd1bd66ce01f904ef8
-
SHA256
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f
-
SHA512
fcb5ddfe77f0713a14d4417a6819d3b8c25ef049d04cf76ee3dd4b7a25c3151919e8d4018325d67dbc1b9563e2e3892626ee997519a318d1fa10fa31b41b35d6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3988 wrote to memory of 3856 3988 rundll32.exe rundll32.exe PID 3988 wrote to memory of 3856 3988 rundll32.exe rundll32.exe PID 3988 wrote to memory of 3856 3988 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll,#12⤵PID:3856
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3856-0-0x0000000000000000-mapping.dmp