Analysis
-
max time kernel
230s -
max time network
496s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 00:02
Behavioral task
behavioral1
Sample
25bdab9cf1c2dbb6e96e1b0797a4facaa0c3469164f1653328e4357fb421e061_unpacked.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25bdab9cf1c2dbb6e96e1b0797a4facaa0c3469164f1653328e4357fb421e061_unpacked.dll
Resource
win10v2004-20220812-en
General
-
Target
25bdab9cf1c2dbb6e96e1b0797a4facaa0c3469164f1653328e4357fb421e061_unpacked.dll
-
Size
277KB
-
MD5
960a14f61af3e94c0702736f097dab03
-
SHA1
0f0d1e38b522de60976a229872d7691cd1288f73
-
SHA256
9801ea6ea41220f101cbeca1cd3a2bbb033ccb9f04b3e121b62c47b2cb4112cc
-
SHA512
500df57c19673f93039341f697ac9e93e17e659b225e9736d496b7dfa7248e7f014add640ebbb22e07a45db779181db82f36f92a7ab20a6ab95cd79c6cd9a10a
-
SSDEEP
6144:7RWLJJp6tgWJLsnp5TlovshucMRuDdIGptJqlalRtNwh8zGd34:IFJeCTTc8uyiGptJqglfNwhRI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4512 wrote to memory of 5088 4512 rundll32.exe rundll32.exe PID 4512 wrote to memory of 5088 4512 rundll32.exe rundll32.exe PID 4512 wrote to memory of 5088 4512 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25bdab9cf1c2dbb6e96e1b0797a4facaa0c3469164f1653328e4357fb421e061_unpacked.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25bdab9cf1c2dbb6e96e1b0797a4facaa0c3469164f1653328e4357fb421e061_unpacked.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5088-132-0x0000000000000000-mapping.dmp