Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    30-03-2021 11:37

General

  • Target

    f2a42097966b356234e73bd49c3e3eaa0a389809383549d92f7172a98211d3fc.dll

  • Size

    565KB

  • MD5

    a260e91236754538c6bbc723ee868a6d

  • SHA1

    4ff89bff6eb9990b991ad818079462a5c98e86ba

  • SHA256

    f2a42097966b356234e73bd49c3e3eaa0a389809383549d92f7172a98211d3fc

  • SHA512

    c14934239f8413ff0afa31fd365ec18673c3e43bd3b817dceec97085949f0340dff697099b9941d03e41ca9d952142f566eb91d437e4a51af59aa29c777ba3d0

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f2a42097966b356234e73bd49c3e3eaa0a389809383549d92f7172a98211d3fc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f2a42097966b356234e73bd49c3e3eaa0a389809383549d92f7172a98211d3fc.dll,#1
      2⤵
        PID:1092

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1092-2-0x0000000000000000-mapping.dmp
    • memory/1092-3-0x00000000760C1000-0x00000000760C3000-memory.dmp
      Filesize

      8KB