Analysis

  • max time kernel
    13s
  • max time network
    117s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-07-2021 10:37

General

  • Target

    3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll

  • Size

    8.1MB

  • MD5

    fada1e4d584af359a688b0631d645f4a

  • SHA1

    e95e15c225fb25d392282815165fb2dddc267435

  • SHA256

    3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3

  • SHA512

    1e1015f04383b42520fabdc0f209ec81bcc210b013c89b982f8b61f40f2eb4aad0c804b7c03bad1dd273d7d121845637ab5a52960ae42a647e6aa364e398e06e

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll,#1
      2⤵
        PID:3212

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3212-114-0x0000000000000000-mapping.dmp