Analysis
-
max time kernel
155s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 20:45
Static task
static1
Behavioral task
behavioral1
Sample
38380f9307564df383000fe1f552826535c3c2d1b5775ecb2aeeb8389cf39746.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
38380f9307564df383000fe1f552826535c3c2d1b5775ecb2aeeb8389cf39746.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
38380f9307564df383000fe1f552826535c3c2d1b5775ecb2aeeb8389cf39746.dll
-
Size
172KB
-
MD5
a421e0676e4773b7c573f3b5cc71251b
-
SHA1
5b1905d548c3427267d588a3c0883e23540f8d97
-
SHA256
38380f9307564df383000fe1f552826535c3c2d1b5775ecb2aeeb8389cf39746
-
SHA512
98d84c7e9af153c44dccc296a5ceb29ad3d3bf2451cda56f8f9856c6d78de47223f6ca149295030442f803ec6046e2536e46a549939adfc1a88ec12ff23d4573
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 6 4956 rundll32.exe 7 4956 rundll32.exe 9 4956 rundll32.exe 13 4956 rundll32.exe 17 4956 rundll32.exe 19 4956 rundll32.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
rundll32.exepid process 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
rundll32.exepid process 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4528 wrote to memory of 4956 4528 rundll32.exe rundll32.exe PID 4528 wrote to memory of 4956 4528 rundll32.exe rundll32.exe PID 4528 wrote to memory of 4956 4528 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38380f9307564df383000fe1f552826535c3c2d1b5775ecb2aeeb8389cf39746.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38380f9307564df383000fe1f552826535c3c2d1b5775ecb2aeeb8389cf39746.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4956-130-0x0000000000000000-mapping.dmp