Analysis
-
max time kernel
4294212s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 17:05
Behavioral task
behavioral1
Sample
a3c14b0b4756017ee248d0fa029196060ca1f75a1fab7e9d81c74fbaac6a4797.dll
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a3c14b0b4756017ee248d0fa029196060ca1f75a1fab7e9d81c74fbaac6a4797.dll
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
a3c14b0b4756017ee248d0fa029196060ca1f75a1fab7e9d81c74fbaac6a4797.dll
-
Size
119KB
-
MD5
959ff528ddbee66e49992cd654d41bab
-
SHA1
7b54da1fb2cbe877b13de309c01a7112224e1f40
-
SHA256
a3c14b0b4756017ee248d0fa029196060ca1f75a1fab7e9d81c74fbaac6a4797
-
SHA512
ef0852311f23f255624c31f320847b5d6ea2da86d81e0693207444b39b73a0f58a0e3f847c585e1a734dc902b1a429c53e193f742e81a60399ac061e76623b54
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 4 1576 rundll32.exe 5 1576 rundll32.exe 6 1576 rundll32.exe 7 1576 rundll32.exe 8 1576 rundll32.exe 9 1576 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 1576 rundll32.exe 1576 rundll32.exe 1576 rundll32.exe 1576 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1576 1684 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3c14b0b4756017ee248d0fa029196060ca1f75a1fab7e9d81c74fbaac6a4797.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3c14b0b4756017ee248d0fa029196060ca1f75a1fab7e9d81c74fbaac6a4797.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1576-54-0x0000000076891000-0x0000000076893000-memory.dmpFilesize
8KB