Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-05-2022 03:46

General

  • Target

    029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll

  • Size

    160KB

  • MD5

    5c3ddf6babde5bb8653326f27636fa37

  • SHA1

    1a51d7b6b65d5ef8c58ae2a09cbd8bf1ad35b97b

  • SHA256

    029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117

  • SHA512

    bbe484c79f5221120eb22719223e58e116ed8336dfb75e624b64fbcfe136a231d478fc64cadeb869a5b007789f2feff42e41105f564382e480153ce36d429773

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll,#1
      2⤵
        PID:860

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/860-54-0x0000000000000000-mapping.dmp
    • memory/860-55-0x0000000074C81000-0x0000000074C83000-memory.dmp
      Filesize

      8KB

    • memory/860-56-0x0000000002AD1000-0x0000000002B53000-memory.dmp
      Filesize

      520KB

    • memory/860-58-0x0000000002F90000-0x00000000030BD000-memory.dmp
      Filesize

      1.2MB

    • memory/860-59-0x0000000000830000-0x000000000084F000-memory.dmp
      Filesize

      124KB

    • memory/860-60-0x00000000033B0000-0x00000000034B9000-memory.dmp
      Filesize

      1.0MB

    • memory/860-62-0x00000000002D0000-0x00000000002D6000-memory.dmp
      Filesize

      24KB

    • memory/860-61-0x0000000000290000-0x000000000029A000-memory.dmp
      Filesize

      40KB