Analysis

  • max time kernel
    44s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 20:14

General

  • Target

    59a997d216f8d26eb699c6cea15567e51953cf5994f45a4076f2bc3cf8981224.dll

  • Size

    19KB

  • MD5

    43f7419bf7dc1535cf042329cf7139c0

  • SHA1

    a0a91fbfef1df955fa5ae2004ceb228ea2afccfa

  • SHA256

    59a997d216f8d26eb699c6cea15567e51953cf5994f45a4076f2bc3cf8981224

  • SHA512

    dd4ffd9d5316f1815a3bdd42aa6debe116fd530eadcb9724b7187ceb3134165d470ba78d4fda133bed6cb4c5b1dad0f7bf33aa7a2974ba7bc140a53a1f423a0e

  • SSDEEP

    384:sEIvAHgfEhDsrQ800i80zY4+j7JdZgU0FaXE8:BIIHhhDsGn80zpW7JdZgtFaXE

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\59a997d216f8d26eb699c6cea15567e51953cf5994f45a4076f2bc3cf8981224.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\59a997d216f8d26eb699c6cea15567e51953cf5994f45a4076f2bc3cf8981224.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/820-54-0x0000000000000000-mapping.dmp

  • memory/820-55-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB