Analysis

  • max time kernel
    110s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    11-11-2021 14:19

General

  • Target

    af89d85a3b579ac754850bd6e52e7516c2e63141107001463486cd01bc175052.bin.dll

  • Size

    695KB

  • MD5

    badf8311607462f3d4efa6363443e082

  • SHA1

    7897acc34f327eb8da08f4ac1c1faeb5188ff276

  • SHA256

    af89d85a3b579ac754850bd6e52e7516c2e63141107001463486cd01bc175052

  • SHA512

    1b50f6686d70cd53caf74457727daf441ba4a08ef40e2c50a3d6045ad2f5aaf91080ca83da997751a7d82a9db0b681ae56ce5f315ae2adda35a7778e4b780b7f

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\af89d85a3b579ac754850bd6e52e7516c2e63141107001463486cd01bc175052.bin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\af89d85a3b579ac754850bd6e52e7516c2e63141107001463486cd01bc175052.bin.dll,#1
      2⤵
        PID:3744

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3744-115-0x0000000000000000-mapping.dmp
    • memory/3744-116-0x0000000004350000-0x000000000478D000-memory.dmp
      Filesize

      4.2MB