Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 08:08
Static task
static1
Behavioral task
behavioral1
Sample
948-57-0x0000000000210000-0x0000000000232000-memory.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
948-57-0x0000000000210000-0x0000000000232000-memory.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
948-57-0x0000000000210000-0x0000000000232000-memory.dll
-
Size
136KB
-
MD5
ef008f3247c80a4882bc651230ac4aff
-
SHA1
e930c2e8d6892c0f8f284965bde1523df711c799
-
SHA256
554a82dc2803928aef17c5ed61cc612ef04ffa4c1abeeba1d62eca907292225c
-
SHA512
650150ffd741f7cb5999b0fc0440902dc1e806dd935b6ee28b1cae02c5fa21551a258844e5c19895d327d65c7a4e8b5f8fcf53f56215db7ffda5159dfe090947
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription pid process target process PID 3376 wrote to memory of 5004 3376 rundll32.exe rundll32.exe PID 3376 wrote to memory of 5004 3376 rundll32.exe rundll32.exe PID 3376 wrote to memory of 5004 3376 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4308 5004 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4308 5004 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4308 5004 rundll32.exe rundll32.exe PID 4308 wrote to memory of 3968 4308 rundll32.exe rundll32.exe PID 4308 wrote to memory of 3968 4308 rundll32.exe rundll32.exe PID 4308 wrote to memory of 3968 4308 rundll32.exe rundll32.exe PID 3968 wrote to memory of 4768 3968 rundll32.exe rundll32.exe PID 3968 wrote to memory of 4768 3968 rundll32.exe rundll32.exe PID 3968 wrote to memory of 4768 3968 rundll32.exe rundll32.exe PID 4768 wrote to memory of 1724 4768 rundll32.exe rundll32.exe PID 4768 wrote to memory of 1724 4768 rundll32.exe rundll32.exe PID 4768 wrote to memory of 1724 4768 rundll32.exe rundll32.exe PID 1724 wrote to memory of 4080 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 4080 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 4080 1724 rundll32.exe rundll32.exe PID 4080 wrote to memory of 5012 4080 rundll32.exe rundll32.exe PID 4080 wrote to memory of 5012 4080 rundll32.exe rundll32.exe PID 4080 wrote to memory of 5012 4080 rundll32.exe rundll32.exe PID 5012 wrote to memory of 4748 5012 rundll32.exe rundll32.exe PID 5012 wrote to memory of 4748 5012 rundll32.exe rundll32.exe PID 5012 wrote to memory of 4748 5012 rundll32.exe rundll32.exe PID 4748 wrote to memory of 4192 4748 rundll32.exe rundll32.exe PID 4748 wrote to memory of 4192 4748 rundll32.exe rundll32.exe PID 4748 wrote to memory of 4192 4748 rundll32.exe rundll32.exe PID 4192 wrote to memory of 1632 4192 rundll32.exe rundll32.exe PID 4192 wrote to memory of 1632 4192 rundll32.exe rundll32.exe PID 4192 wrote to memory of 1632 4192 rundll32.exe rundll32.exe PID 1632 wrote to memory of 4848 1632 rundll32.exe rundll32.exe PID 1632 wrote to memory of 4848 1632 rundll32.exe rundll32.exe PID 1632 wrote to memory of 4848 1632 rundll32.exe rundll32.exe PID 4848 wrote to memory of 1264 4848 rundll32.exe rundll32.exe PID 4848 wrote to memory of 1264 4848 rundll32.exe rundll32.exe PID 4848 wrote to memory of 1264 4848 rundll32.exe rundll32.exe PID 1264 wrote to memory of 2300 1264 rundll32.exe rundll32.exe PID 1264 wrote to memory of 2300 1264 rundll32.exe rundll32.exe PID 1264 wrote to memory of 2300 1264 rundll32.exe rundll32.exe PID 2300 wrote to memory of 3332 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 3332 2300 rundll32.exe rundll32.exe PID 2300 wrote to memory of 3332 2300 rundll32.exe rundll32.exe PID 3332 wrote to memory of 1128 3332 rundll32.exe rundll32.exe PID 3332 wrote to memory of 1128 3332 rundll32.exe rundll32.exe PID 3332 wrote to memory of 1128 3332 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#15⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#17⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#18⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#15⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#17⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\948-57-0x0000000000210000-0x0000000000232000-memory.dll,#18⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1128-144-0x0000000000000000-mapping.dmp
-
memory/1264-141-0x0000000000000000-mapping.dmp
-
memory/1632-139-0x0000000000000000-mapping.dmp
-
memory/1724-134-0x0000000000000000-mapping.dmp
-
memory/2300-142-0x0000000000000000-mapping.dmp
-
memory/3332-143-0x0000000000000000-mapping.dmp
-
memory/3968-132-0x0000000000000000-mapping.dmp
-
memory/4080-135-0x0000000000000000-mapping.dmp
-
memory/4192-138-0x0000000000000000-mapping.dmp
-
memory/4308-131-0x0000000000000000-mapping.dmp
-
memory/4748-137-0x0000000000000000-mapping.dmp
-
memory/4768-133-0x0000000000000000-mapping.dmp
-
memory/4848-140-0x0000000000000000-mapping.dmp
-
memory/5004-130-0x0000000000000000-mapping.dmp
-
memory/5012-136-0x0000000000000000-mapping.dmp