Analysis

  • max time kernel
    24s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-06-2022 17:31

General

  • Target

    400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll

  • Size

    164KB

  • MD5

    254cd1d31f058e39eef72b232cfd4f62

  • SHA1

    7f4e88d3c45098426deb929cb2ad7af64faa405f

  • SHA256

    400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a

  • SHA512

    e8897b13ef51ffe45883c8b0761dc9fc192d826c6e489c2c180f1f6cbe944d024fb27487cef3bfaa3d6e7b7d8eddacad33bfcde80b1b5dad20be1340ad3b7694

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll,#1
      2⤵
        PID:2008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2008-54-0x0000000000000000-mapping.dmp
    • memory/2008-55-0x0000000075FB1000-0x0000000075FB3000-memory.dmp
      Filesize

      8KB

    • memory/2008-57-0x0000000002BF0000-0x0000000002C8F000-memory.dmp
      Filesize

      636KB

    • memory/2008-58-0x0000000002F60000-0x000000000308D000-memory.dmp
      Filesize

      1.2MB

    • memory/2008-59-0x0000000000110000-0x000000000011A000-memory.dmp
      Filesize

      40KB

    • memory/2008-60-0x0000000001D50000-0x0000000001D6F000-memory.dmp
      Filesize

      124KB

    • memory/2008-61-0x0000000003350000-0x0000000003459000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-62-0x0000000000240000-0x0000000000246000-memory.dmp
      Filesize

      24KB