Resubmissions

26-09-2021 13:12

210926-qfh3daegfr 1

26-09-2021 13:09

210926-qdrxhaegfn 1

Analysis

  • max time kernel
    74s
  • max time network
    84s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 13:12

General

  • Target

    03b9c7a3b73f15dfc2dcb0b74f3e971fdda7d1d1e2010c6d1861043f90a2fecd.dll

  • Size

    201KB

  • MD5

    0a49ed1c5419bb9752821d856f7ce4ff

  • SHA1

    e026e1f27d503a23aaab354c1de6e17d4c6a2b1f

  • SHA256

    03b9c7a3b73f15dfc2dcb0b74f3e971fdda7d1d1e2010c6d1861043f90a2fecd

  • SHA512

    96ec587ef98eb791ce9599e87f180a26379c653df7ae3275f9cc9db642ba75d5db45b27c5b8b97a8d26d2c1862ccee0d7e7fbbdf66131544b87af13baab657a8

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\03b9c7a3b73f15dfc2dcb0b74f3e971fdda7d1d1e2010c6d1861043f90a2fecd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\03b9c7a3b73f15dfc2dcb0b74f3e971fdda7d1d1e2010c6d1861043f90a2fecd.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/512-114-0x0000000000000000-mapping.dmp
  • memory/512-116-0x0000000002710000-0x0000000002744000-memory.dmp
    Filesize

    208KB