Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-06-2022 08:07
Static task
static1
Behavioral task
behavioral1
Sample
172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe
Resource
win10v2004-20220414-en
General
-
Target
172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe
-
Size
1.0MB
-
MD5
eae5ee3121523c718094873f56b64bce
-
SHA1
adbc2b251f69f04086e4cf6af74544bcd025d5de
-
SHA256
172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d
-
SHA512
f27a60a5d3563a3c04ee2114cdf4526be5511acb9f81b0030024a30f3c81e75765844cd3047813050f4c56d8859ec6006a11a0c13c5091aa7a34d501d48f4e95
Malware Config
Signatures
-
Blocklisted process makes network request 38 IoCs
Processes:
rundll32.exeflow pid process 2 1644 rundll32.exe 5 1644 rundll32.exe 6 1644 rundll32.exe 7 1644 rundll32.exe 8 1644 rundll32.exe 9 1644 rundll32.exe 10 1644 rundll32.exe 11 1644 rundll32.exe 12 1644 rundll32.exe 13 1644 rundll32.exe 14 1644 rundll32.exe 15 1644 rundll32.exe 17 1644 rundll32.exe 18 1644 rundll32.exe 19 1644 rundll32.exe 20 1644 rundll32.exe 21 1644 rundll32.exe 22 1644 rundll32.exe 23 1644 rundll32.exe 24 1644 rundll32.exe 25 1644 rundll32.exe 26 1644 rundll32.exe 27 1644 rundll32.exe 28 1644 rundll32.exe 29 1644 rundll32.exe 30 1644 rundll32.exe 31 1644 rundll32.exe 32 1644 rundll32.exe 33 1644 rundll32.exe 34 1644 rundll32.exe 35 1644 rundll32.exe 36 1644 rundll32.exe 37 1644 rundll32.exe 38 1644 rundll32.exe 39 1644 rundll32.exe 40 1644 rundll32.exe 41 1644 rundll32.exe 44 1644 rundll32.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exedescription pid process target process PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe PID 536 wrote to memory of 1644 536 172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe"C:\Users\Admin\AppData\Local\Temp\172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/536-54-0x00000000002D0000-0x00000000003B2000-memory.dmpFilesize
904KB
-
memory/536-55-0x0000000000400000-0x0000000000728000-memory.dmpFilesize
3.2MB
-
memory/536-56-0x00000000002D0000-0x00000000003B2000-memory.dmpFilesize
904KB
-
memory/536-57-0x0000000002170000-0x00000000023A0000-memory.dmpFilesize
2.2MB
-
memory/536-58-0x0000000000400000-0x0000000000728000-memory.dmpFilesize
3.2MB
-
memory/536-59-0x0000000075B61000-0x0000000075B63000-memory.dmpFilesize
8KB
-
memory/536-139-0x0000000000400000-0x0000000000728000-memory.dmpFilesize
3.2MB
-
memory/1644-129-0x00000000000B0000-0x00000000000B4000-memory.dmpFilesize
16KB
-
memory/1644-138-0x0000000000140000-0x0000000000144000-memory.dmpFilesize
16KB
-
memory/1644-126-0x0000000000080000-0x0000000000084000-memory.dmpFilesize
16KB
-
memory/1644-127-0x0000000000090000-0x0000000000094000-memory.dmpFilesize
16KB
-
memory/1644-128-0x00000000000A0000-0x00000000000A4000-memory.dmpFilesize
16KB
-
memory/1644-62-0x00000000002E0000-0x00000000002E4000-memory.dmpFilesize
16KB
-
memory/1644-130-0x00000000000C0000-0x00000000000C4000-memory.dmpFilesize
16KB
-
memory/1644-131-0x00000000000D0000-0x00000000000D4000-memory.dmpFilesize
16KB
-
memory/1644-137-0x0000000000130000-0x0000000000134000-memory.dmpFilesize
16KB
-
memory/1644-124-0x0000000000000000-mapping.dmp
-
memory/1644-136-0x0000000000120000-0x0000000000124000-memory.dmpFilesize
16KB
-
memory/1644-135-0x0000000000110000-0x0000000000114000-memory.dmpFilesize
16KB
-
memory/1644-134-0x0000000000100000-0x0000000000104000-memory.dmpFilesize
16KB
-
memory/1644-133-0x00000000000F0000-0x00000000000F4000-memory.dmpFilesize
16KB
-
memory/1644-132-0x00000000000E0000-0x00000000000E4000-memory.dmpFilesize
16KB
-
memory/1644-60-0x00000000002E0000-0x00000000002E4000-memory.dmpFilesize
16KB
-
memory/1644-140-0x0000000000140000-0x0000000000144000-memory.dmpFilesize
16KB