Analysis

  • max time kernel
    26s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 23:04

General

  • Target

    3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll

  • Size

    164KB

  • MD5

    8f286ca2abef24f99a5d9132699cf104

  • SHA1

    dce33985bce7cab1bb1fbc44f16e8c9ceaa0a84a

  • SHA256

    3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f

  • SHA512

    a877401f5f905e7f8636279be05f27056bfedbcc88cf4632e54df3f3e0979e9381a6a2bd5e44f134d1864f902dfc49296d7831dad6c44366a5ec74bfbfbe93f6

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll,#1
      2⤵
        PID:888

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/888-54-0x0000000000000000-mapping.dmp
    • memory/888-55-0x00000000750C1000-0x00000000750C3000-memory.dmp
      Filesize

      8KB

    • memory/888-57-0x0000000002BA0000-0x0000000002C3F000-memory.dmp
      Filesize

      636KB

    • memory/888-59-0x0000000000740000-0x000000000075F000-memory.dmp
      Filesize

      124KB

    • memory/888-60-0x0000000003480000-0x0000000003589000-memory.dmp
      Filesize

      1.0MB

    • memory/888-61-0x00000000000C0000-0x00000000000CA000-memory.dmp
      Filesize

      40KB

    • memory/888-62-0x00000000006E0000-0x00000000006E6000-memory.dmp
      Filesize

      24KB