Analysis

  • max time kernel
    31s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 11:03

General

  • Target

    c1c16115d37fbd9d38b24b8895cc5bef2cfe6a2b92a0b11aed300819908c815a.dll

  • Size

    51KB

  • MD5

    6d7badc50c68789a9599d952f95743a0

  • SHA1

    347022571ce5a0474aecd15823b2dcb838b353b9

  • SHA256

    c1c16115d37fbd9d38b24b8895cc5bef2cfe6a2b92a0b11aed300819908c815a

  • SHA512

    a3d2d84ccae2819de79fdf396f1d6d210ce91be73321d0b377e79efc1fcc85a9ba277cedefdc6acdaa888c3e928ef69aa63c545c1053eea024ac7619f14dad7e

  • SSDEEP

    768:1zExMf4sJGHw2jn4z22evPfrkCO2h+dhErV0EJ7hS0uC5yqUenpgpWpcfM:1zExMwCGQ2j4z220A6mEMKynenqpykM

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c1c16115d37fbd9d38b24b8895cc5bef2cfe6a2b92a0b11aed300819908c815a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c1c16115d37fbd9d38b24b8895cc5bef2cfe6a2b92a0b11aed300819908c815a.dll,#1
      2⤵
        PID:1620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-55-0x0000000076681000-0x0000000076683000-memory.dmp

      Filesize

      8KB