Analysis
-
max time kernel
140s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 17:31
Static task
static1
Behavioral task
behavioral1
Sample
400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll
-
Size
164KB
-
MD5
254cd1d31f058e39eef72b232cfd4f62
-
SHA1
7f4e88d3c45098426deb929cb2ad7af64faa405f
-
SHA256
400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a
-
SHA512
e8897b13ef51ffe45883c8b0761dc9fc192d826c6e489c2c180f1f6cbe944d024fb27487cef3bfaa3d6e7b7d8eddacad33bfcde80b1b5dad20be1340ad3b7694
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4556 wrote to memory of 3140 4556 rundll32.exe rundll32.exe PID 4556 wrote to memory of 3140 4556 rundll32.exe rundll32.exe PID 4556 wrote to memory of 3140 4556 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\400152edc87569bcbecbf1d5008de709732f5a1ee9cdbb7b11816b9fa884f03a.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3140-130-0x0000000000000000-mapping.dmp