Analysis
-
max time kernel
13s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-07-2021 10:37
Behavioral task
behavioral1
Sample
3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll
-
Size
8.1MB
-
MD5
fada1e4d584af359a688b0631d645f4a
-
SHA1
e95e15c225fb25d392282815165fb2dddc267435
-
SHA256
3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3
-
SHA512
1e1015f04383b42520fabdc0f209ec81bcc210b013c89b982f8b61f40f2eb4aad0c804b7c03bad1dd273d7d121845637ab5a52960ae42a647e6aa364e398e06e
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3896 wrote to memory of 3212 3896 rundll32.exe rundll32.exe PID 3896 wrote to memory of 3212 3896 rundll32.exe rundll32.exe PID 3896 wrote to memory of 3212 3896 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3509b02cb0a2babbddb6a8f51f998fc4175c709f2f8eea24125dd6d553caead3.bin.sample.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3212-114-0x0000000000000000-mapping.dmp