Analysis
-
max time kernel
143s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 07:34
Static task
static1
Behavioral task
behavioral1
Sample
1984-57-0x0000000001C90000-0x0000000001CB2000-memory.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1984-57-0x0000000001C90000-0x0000000001CB2000-memory.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
1984-57-0x0000000001C90000-0x0000000001CB2000-memory.dll
-
Size
136KB
-
MD5
eb3979391bd49a31307f94d19927fb1e
-
SHA1
5f2f3f7b74ed702b135af197ee1edfbaf5116680
-
SHA256
b69070e0397824a706ec3bc60e9d6e7b7ba681d93aa803f56152b8406383063d
-
SHA512
9535e57cb923e8661f23738559c3df8a1c294a4b2db8b25541a27b1d2bf1ce7e84ecc9989fdf24ffa54bb8aa0a96f88fde96dc09f175ee39cdc99cc6f07ef417
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4696 wrote to memory of 2232 4696 rundll32.exe rundll32.exe PID 4696 wrote to memory of 2232 4696 rundll32.exe rundll32.exe PID 4696 wrote to memory of 2232 4696 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1984-57-0x0000000001C90000-0x0000000001CB2000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1984-57-0x0000000001C90000-0x0000000001CB2000-memory.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2232-130-0x0000000000000000-mapping.dmp