Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 01:07
Static task
static1
Behavioral task
behavioral1
Sample
c53fa5f8345c7e15220f445f5babe995d7f49d8319fe99c5ebca4dc0b6d3c03a.dll
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c53fa5f8345c7e15220f445f5babe995d7f49d8319fe99c5ebca4dc0b6d3c03a.dll
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
c53fa5f8345c7e15220f445f5babe995d7f49d8319fe99c5ebca4dc0b6d3c03a.dll
-
Size
164KB
-
MD5
34c7caf74e06c60991d41df99ff387f4
-
SHA1
6a1ce2234360cc4d55100905581ef5370589498c
-
SHA256
c53fa5f8345c7e15220f445f5babe995d7f49d8319fe99c5ebca4dc0b6d3c03a
-
SHA512
85fa9b7ccafb2731777eab4f323f29920208e21de4630031f5d4e8c9bc9287254d1cf4af4662344ff15277dd44fb8d131469909d6de4352fda72638c2f6b4350
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 652 1212 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c53fa5f8345c7e15220f445f5babe995d7f49d8319fe99c5ebca4dc0b6d3c03a.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c53fa5f8345c7e15220f445f5babe995d7f49d8319fe99c5ebca4dc0b6d3c03a.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/652-54-0x0000000076001000-0x0000000076003000-memory.dmpFilesize
8KB
-
memory/652-56-0x00000000001F0000-0x00000000001FA000-memory.dmpFilesize
40KB
-
memory/652-57-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/652-58-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/652-59-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/652-55-0x0000000002110000-0x00000000021D9000-memory.dmpFilesize
804KB
-
memory/652-60-0x0000000000CDA000-0x0000000000CF1000-memory.dmpFilesize
92KB
-
memory/652-61-0x00000000023D0000-0x00000000024FD000-memory.dmpFilesize
1.2MB
-
memory/652-62-0x0000000000710000-0x000000000072F000-memory.dmpFilesize
124KB
-
memory/652-64-0x00000000002B0000-0x00000000002B6000-memory.dmpFilesize
24KB
-
memory/652-63-0x0000000003130000-0x0000000003239000-memory.dmpFilesize
1.0MB