Analysis

  • max time kernel
    12s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 22:12

General

  • Target

    a9cbce007a7467ba1394eed32b9c1774ad09a9a9fb74eb2ccc584749273fac01.bin.dll

  • Size

    70KB

  • MD5

    bb1c7759e5f45dd72463313c8b666bb3

  • SHA1

    8c9144eda5f701a5aa77e859038446432d8848d3

  • SHA256

    a9cbce007a7467ba1394eed32b9c1774ad09a9a9fb74eb2ccc584749273fac01

  • SHA512

    9505f4d2e52317ccce09b70ab0fa62146c1acc5afd552906188f0be011204ab7ae9c9fb4508cfa640004d7d3638ab7db0eca3fdfe491dd8157049ea8d7a6a86c

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9cbce007a7467ba1394eed32b9c1774ad09a9a9fb74eb2ccc584749273fac01.bin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9cbce007a7467ba1394eed32b9c1774ad09a9a9fb74eb2ccc584749273fac01.bin.dll,#1
      2⤵
        PID:3620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3620-114-0x0000000000000000-mapping.dmp