Analysis
-
max time kernel
26s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll
-
Size
164KB
-
MD5
8f286ca2abef24f99a5d9132699cf104
-
SHA1
dce33985bce7cab1bb1fbc44f16e8c9ceaa0a84a
-
SHA256
3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f
-
SHA512
a877401f5f905e7f8636279be05f27056bfedbcc88cf4632e54df3f3e0979e9381a6a2bd5e44f134d1864f902dfc49296d7831dad6c44366a5ec74bfbfbe93f6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3785ab47343608f1ef6defe047a7b495f9b24538b6dac2d1b87f8bcf2027624f.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/888-54-0x0000000000000000-mapping.dmp
-
memory/888-55-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/888-57-0x0000000002BA0000-0x0000000002C3F000-memory.dmpFilesize
636KB
-
memory/888-59-0x0000000000740000-0x000000000075F000-memory.dmpFilesize
124KB
-
memory/888-60-0x0000000003480000-0x0000000003589000-memory.dmpFilesize
1.0MB
-
memory/888-61-0x00000000000C0000-0x00000000000CA000-memory.dmpFilesize
40KB
-
memory/888-62-0x00000000006E0000-0x00000000006E6000-memory.dmpFilesize
24KB