Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
26-04-2022 23:42
Static task
static1
Behavioral task
behavioral1
Sample
690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll
Resource
win10-20220414-en
Behavioral task
behavioral3
Sample
690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral4
Sample
690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll
Resource
win11-20220223-en
General
-
Target
690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll
-
Size
34KB
-
MD5
1ca0fbd832f9f7cdc0e50b29bd0d970f
-
SHA1
9be6a2bc9df78f4566e5690e2f1bb696ae96cb48
-
SHA256
690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87
-
SHA512
5b236385ac4c1a6131163c6cb562f4c87691990a84b08afa7fbe764b5ddf3bc88edd7efe16dd6bd7ba5b6c7c9271146100a41ed9289c73958e7b282eaa7740e1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2700 wrote to memory of 3044 2700 rundll32.exe rundll32.exe PID 2700 wrote to memory of 3044 2700 rundll32.exe rundll32.exe PID 2700 wrote to memory of 3044 2700 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\690c488a9902978f2ef05aa23d21f4fa30a52dd9d11191f9b49667cd08618d87.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3044-118-0x0000000000000000-mapping.dmp