Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-05-2022 03:46
Static task
static1
Behavioral task
behavioral1
Sample
029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll
-
Size
160KB
-
MD5
5c3ddf6babde5bb8653326f27636fa37
-
SHA1
1a51d7b6b65d5ef8c58ae2a09cbd8bf1ad35b97b
-
SHA256
029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117
-
SHA512
bbe484c79f5221120eb22719223e58e116ed8336dfb75e624b64fbcfe136a231d478fc64cadeb869a5b007789f2feff42e41105f564382e480153ce36d429773
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 860 1784 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\029759c8d9f3eea27504883565bf6dfa961d4c366fc536ed68318d47d7e8f117.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/860-54-0x0000000000000000-mapping.dmp
-
memory/860-55-0x0000000074C81000-0x0000000074C83000-memory.dmpFilesize
8KB
-
memory/860-56-0x0000000002AD1000-0x0000000002B53000-memory.dmpFilesize
520KB
-
memory/860-58-0x0000000002F90000-0x00000000030BD000-memory.dmpFilesize
1.2MB
-
memory/860-59-0x0000000000830000-0x000000000084F000-memory.dmpFilesize
124KB
-
memory/860-60-0x00000000033B0000-0x00000000034B9000-memory.dmpFilesize
1.0MB
-
memory/860-62-0x00000000002D0000-0x00000000002D6000-memory.dmpFilesize
24KB
-
memory/860-61-0x0000000000290000-0x000000000029A000-memory.dmpFilesize
40KB