Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-05-2022 02:11

General

  • Target

    11f44531fb088d31307d87b01e8eabff/iroto1.dll

  • Size

    434KB

  • MD5

    8e6fbefcbac2a1967941fa692c82c3ca

  • SHA1

    242a7803adb19f638ef62077f1b76756f3a13a0d

  • SHA256

    e05c717b43f7e204f315eb8c298f9715791385516335acd8f20ec9e26c3e9b0b

  • SHA512

    bc6dc64fa5bc19f234e3df27f718a50f82f6f086da2cd761d81edda4cf9355b40115279ebc368a0f55cf651405e34988336f9f5c3577ce7a7433971194a7b179

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\11f44531fb088d31307d87b01e8eabff\iroto1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\11f44531fb088d31307d87b01e8eabff\iroto1.dll,#1
      2⤵
        PID:1468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1468-54-0x0000000000000000-mapping.dmp

    • memory/1468-55-0x00000000752D1000-0x00000000752D3000-memory.dmp

      Filesize

      8KB