Analysis
-
max time kernel
35s -
max time network
45s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-05-2021 10:06
Static task
static1
Behavioral task
behavioral1
Sample
5d3c76539a3faef6f75cbfe529ed709246137b40f2fd22e9c85f4fd89e209eeb.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
5d3c76539a3faef6f75cbfe529ed709246137b40f2fd22e9c85f4fd89e209eeb.dll
-
Size
953KB
-
MD5
4b57896be3c291c5d7472e170aa0899c
-
SHA1
4c4ec8d0a4ee0a443f37847bc913ac8d2dd3ed48
-
SHA256
5d3c76539a3faef6f75cbfe529ed709246137b40f2fd22e9c85f4fd89e209eeb
-
SHA512
b337a804f161f6966071a20262412ba82585b3a1e65f32cc03818cf89ec4000914d9d6a357e8b2aa6f20e07f1b4f2807f273498dcdabe6940966ef308b928266
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 672 wrote to memory of 848 672 rundll32.exe rundll32.exe PID 672 wrote to memory of 848 672 rundll32.exe rundll32.exe PID 672 wrote to memory of 848 672 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d3c76539a3faef6f75cbfe529ed709246137b40f2fd22e9c85f4fd89e209eeb.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d3c76539a3faef6f75cbfe529ed709246137b40f2fd22e9c85f4fd89e209eeb.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/848-114-0x0000000000000000-mapping.dmp