Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-06-2022 07:52
Static task
static1
Behavioral task
behavioral1
Sample
284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe
Resource
win10v2004-20220414-en
General
-
Target
284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe
-
Size
1.0MB
-
MD5
ba55442cdf361e070f7ca8a07046cd38
-
SHA1
e61d143672c9bad99472aa885003a20574eddf32
-
SHA256
284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc
-
SHA512
a6e1669bf9a159d3d36aa24e7210854667c144f0f34c7d38fb6c2848d1687964c7d48d7760f99898eb4eb8d8eebf1be595890e80273c7d4326069c2a9d13feff
Malware Config
Signatures
-
Blocklisted process makes network request 38 IoCs
Processes:
rundll32.exeflow pid process 2 912 rundll32.exe 5 912 rundll32.exe 6 912 rundll32.exe 7 912 rundll32.exe 8 912 rundll32.exe 9 912 rundll32.exe 10 912 rundll32.exe 11 912 rundll32.exe 12 912 rundll32.exe 13 912 rundll32.exe 14 912 rundll32.exe 16 912 rundll32.exe 17 912 rundll32.exe 18 912 rundll32.exe 19 912 rundll32.exe 20 912 rundll32.exe 21 912 rundll32.exe 22 912 rundll32.exe 23 912 rundll32.exe 24 912 rundll32.exe 25 912 rundll32.exe 26 912 rundll32.exe 27 912 rundll32.exe 28 912 rundll32.exe 29 912 rundll32.exe 30 912 rundll32.exe 31 912 rundll32.exe 32 912 rundll32.exe 33 912 rundll32.exe 34 912 rundll32.exe 35 912 rundll32.exe 36 912 rundll32.exe 37 912 rundll32.exe 38 912 rundll32.exe 39 912 rundll32.exe 40 912 rundll32.exe 41 912 rundll32.exe 43 912 rundll32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exedescription pid process target process PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe PID 1852 wrote to memory of 912 1852 284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe"C:\Users\Admin\AppData\Local\Temp\284eb686af9cb14c8176f47708136a9643af1b5c5102b61737735c6a04bef4fc.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/912-94-0x0000000000080000-0x0000000000083000-memory.dmpFilesize
12KB
-
memory/912-60-0x00000000001E0000-0x00000000001E3000-memory.dmpFilesize
12KB
-
memory/912-62-0x00000000001E0000-0x00000000001E3000-memory.dmpFilesize
12KB
-
memory/912-92-0x0000000000000000-mapping.dmp
-
memory/912-95-0x0000000000090000-0x0000000000093000-memory.dmpFilesize
12KB
-
memory/912-97-0x0000000000090000-0x0000000000093000-memory.dmpFilesize
12KB
-
memory/1852-55-0x0000000000400000-0x0000000000725000-memory.dmpFilesize
3.1MB
-
memory/1852-56-0x0000000000730000-0x0000000000812000-memory.dmpFilesize
904KB
-
memory/1852-57-0x0000000001FD0000-0x0000000002200000-memory.dmpFilesize
2.2MB
-
memory/1852-58-0x0000000000400000-0x0000000000725000-memory.dmpFilesize
3.1MB
-
memory/1852-59-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/1852-54-0x0000000000730000-0x0000000000812000-memory.dmpFilesize
904KB
-
memory/1852-96-0x0000000000400000-0x0000000000725000-memory.dmpFilesize
3.1MB