Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
90a106dae1df38fa9307323936e5171067dfe4d5c52f0e5ced54da7c00701bb1.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
90a106dae1df38fa9307323936e5171067dfe4d5c52f0e5ced54da7c00701bb1.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
90a106dae1df38fa9307323936e5171067dfe4d5c52f0e5ced54da7c00701bb1.dll
-
Size
686KB
-
MD5
a74d10fb5ebcc68342a33301c9fe59db
-
SHA1
318827d54fbcfab77af708031fe32af814aac398
-
SHA256
90a106dae1df38fa9307323936e5171067dfe4d5c52f0e5ced54da7c00701bb1
-
SHA512
43c2b51347ef37e84ca3f74decc8fae80e3838ddeabc122c09f1de45a426d392a1dcdac5db682ecb3fdb835028d36d99f00b97871dd99f46b6b60dd2ee7df958
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4816 wrote to memory of 2572 4816 rundll32.exe rundll32.exe PID 4816 wrote to memory of 2572 4816 rundll32.exe rundll32.exe PID 4816 wrote to memory of 2572 4816 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90a106dae1df38fa9307323936e5171067dfe4d5c52f0e5ced54da7c00701bb1.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90a106dae1df38fa9307323936e5171067dfe4d5c52f0e5ced54da7c00701bb1.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2572-130-0x0000000000000000-mapping.dmp