Analysis
-
max time kernel
96s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 15:29
Static task
static1
Behavioral task
behavioral1
Sample
8b4cd38964a978be47ce8e04cf4d9187.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8b4cd38964a978be47ce8e04cf4d9187.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
8b4cd38964a978be47ce8e04cf4d9187.dll
-
Size
667KB
-
MD5
8b4cd38964a978be47ce8e04cf4d9187
-
SHA1
343570bca7074d59b1e3372854e9021aaf1df24a
-
SHA256
fba91bfd4e8a0ec297cee0edd5ae715a6e11fc32bf751baf18fc9545a942c2b0
-
SHA512
3e3d82449af99642f4d8d58611fb4d8b2b9cacd6451f95a551dde105f4475176a57df253b56612e0c244db6aba8cbf2960e582631f0b4b324590b134262e36ac
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 988 wrote to memory of 1200 988 rundll32.exe rundll32.exe PID 988 wrote to memory of 1200 988 rundll32.exe rundll32.exe PID 988 wrote to memory of 1200 988 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b4cd38964a978be47ce8e04cf4d9187.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b4cd38964a978be47ce8e04cf4d9187.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1200-2-0x0000000000000000-mapping.dmp