Analysis

  • max time kernel
    118s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 01:55

General

  • Target

    6696f5796d16c2c55bcb5f749c298f7dbaf6e58f97a469826fde76681a049239.dll

  • Size

    164KB

  • MD5

    9260fb7c3912c500c116b71149ee6d13

  • SHA1

    1d2bd485cc2a460c76e7165dd78d9ec529e112f6

  • SHA256

    6696f5796d16c2c55bcb5f749c298f7dbaf6e58f97a469826fde76681a049239

  • SHA512

    4aa3f21aa5cf185b496f9c089df43a120eb496cde9cb3063ac21a8639727a527e899f674d8ecf3f9d100ba7df471596412d6c2720f61104440a430ef4ff4540a

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6696f5796d16c2c55bcb5f749c298f7dbaf6e58f97a469826fde76681a049239.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6696f5796d16c2c55bcb5f749c298f7dbaf6e58f97a469826fde76681a049239.dll,#1
      2⤵
        PID:1916

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1916-54-0x0000000075471000-0x0000000075473000-memory.dmp
      Filesize

      8KB

    • memory/1916-56-0x00000000000B0000-0x00000000000BA000-memory.dmp
      Filesize

      40KB

    • memory/1916-57-0x0000000000110000-0x0000000000111000-memory.dmp
      Filesize

      4KB

    • memory/1916-58-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1916-59-0x0000000000130000-0x0000000000131000-memory.dmp
      Filesize

      4KB

    • memory/1916-60-0x0000000002F20000-0x0000000002FBF000-memory.dmp
      Filesize

      636KB

    • memory/1916-61-0x0000000002FC0000-0x00000000030ED000-memory.dmp
      Filesize

      1.2MB

    • memory/1916-62-0x0000000000A90000-0x0000000000AAF000-memory.dmp
      Filesize

      124KB

    • memory/1916-63-0x00000000033A0000-0x00000000034A9000-memory.dmp
      Filesize

      1.0MB

    • memory/1916-64-0x0000000000140000-0x0000000000146000-memory.dmp
      Filesize

      24KB