Analysis

  • max time kernel
    4s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    23-02-2021 12:39

General

  • Target

    21dd54f0c00482b312374fb06e38686b519aa235a9f97de4d3df01039cb1df60.dll

  • Size

    184KB

  • MD5

    589272522ce380ce8b22d3f85e34200e

  • SHA1

    25230760429e4630ab478efe9843a7e758d56588

  • SHA256

    21dd54f0c00482b312374fb06e38686b519aa235a9f97de4d3df01039cb1df60

  • SHA512

    5d7512684be5b6a8c4b4f198e4822f9a51c54c8ae3c8e5832105bc5a82836d429b2f6d5bea49c4d027101c1b5510affb9683f30cf7572bac73eb12b88327d83b

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\21dd54f0c00482b312374fb06e38686b519aa235a9f97de4d3df01039cb1df60.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\21dd54f0c00482b312374fb06e38686b519aa235a9f97de4d3df01039cb1df60.dll,#1
      2⤵
        PID:2000

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2000-2-0x0000000000000000-mapping.dmp
    • memory/2000-3-0x0000000075A61000-0x0000000075A63000-memory.dmp
      Filesize

      8KB