35823106288275adb9d1bd4bc25f08d8c1b8803540b8d8b2040b8098a1450ace.bin.sample
General
Target
Filesize
Completed
35823106288275adb9d1bd4bc25f08d8c1b8803540b8d8b2040b8098a1450ace.bin.sample.dll
8MB
10-07-2021 10:38
Score
1/10
MD5
SHA1
SHA256
d312c332180ca2fbc961dbe7557690de
115a5a6c3b8e40d3abca0e99dd355141ef7a35ba
35823106288275adb9d1bd4bc25f08d8c1b8803540b8d8b2040b8098a1450ace
Malware Config
Signatures 1
Filter: none
-
Suspicious use of WriteProcessMemoryrundll32.exe
Reported IOCs
description pid process target process PID 1496 wrote to memory of 3832 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 3832 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 3832 1496 rundll32.exe rundll32.exe
Processes 2
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35823106288275adb9d1bd4bc25f08d8c1b8803540b8d8b2040b8098a1450ace.bin.sample.dll,#1Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35823106288275adb9d1bd4bc25f08d8c1b8803540b8d8b2040b8098a1450ace.bin.sample.dll,#1
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/3832-114-0x0000000000000000-mapping.dmp
Title
Loading data