Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-11-2020 11:43
Static task
static1
Behavioral task
behavioral1
Sample
eec6242c2d70a864c633f68dc49ce4437eeb2e91c24785b2a3a16be7c17a5d4a.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
eec6242c2d70a864c633f68dc49ce4437eeb2e91c24785b2a3a16be7c17a5d4a.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
eec6242c2d70a864c633f68dc49ce4437eeb2e91c24785b2a3a16be7c17a5d4a.dll
-
Size
207KB
-
MD5
a4a685076e476e2dbf6d85274e9f1af7
-
SHA1
48e278116fe29a0c7502af98c49b74827ca48df4
-
SHA256
eec6242c2d70a864c633f68dc49ce4437eeb2e91c24785b2a3a16be7c17a5d4a
-
SHA512
bfe177fb58f3f0fbd0760c0f7e8ebda0870bc99cf9b4edd84a25891f1e0419a77544468ac816295d2e5eeee2573c5f4c781962827d211c68fd5b420c06d07c3f
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 1664 240 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eec6242c2d70a864c633f68dc49ce4437eeb2e91c24785b2a3a16be7c17a5d4a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eec6242c2d70a864c633f68dc49ce4437eeb2e91c24785b2a3a16be7c17a5d4a.dll,#12⤵PID:1664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1664-0-0x0000000000000000-mapping.dmp