Analysis
-
max time kernel
91s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 19:23
Static task
static1
Behavioral task
behavioral1
Sample
ef62f2b7c05210471d56b8bee8072d2e.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ef62f2b7c05210471d56b8bee8072d2e.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
ef62f2b7c05210471d56b8bee8072d2e.dll
-
Size
24KB
-
MD5
ef62f2b7c05210471d56b8bee8072d2e
-
SHA1
c71ad39f0551a334c7f27261b660f2b54db097ac
-
SHA256
64255ff02e774588995b203d556c9fa9e2c22a978aec02ff7dea372983b47d38
-
SHA512
2d94544401b6319ccad26df71c529c914804b021c5e64055da84e6b68c07e1f48a99578c231562408704e178f353118877f648aed721627dfd457ed07c2fee2a
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2388 wrote to memory of 2664 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 2664 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 2664 2388 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef62f2b7c05210471d56b8bee8072d2e.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef62f2b7c05210471d56b8bee8072d2e.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2664-130-0x0000000000000000-mapping.dmp