Analysis
-
max time kernel
375s -
max time network
854s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-10-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
Brmem_Profpllpdsp.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Brmem_Profpllpdsp.dll
Resource
win10-20220812-en
General
-
Target
Brmem_Profpllpdsp.dll
-
Size
261KB
-
MD5
8e0aa77386d8654cdfe1e896fdf529b1
-
SHA1
1b46f449fbfb1a91eb5274529bcf097ebe52b0e4
-
SHA256
12e6883046e2c92cbe3b5706ea7f1181b44512f179c7f04e88e75f3f6e392a48
-
SHA512
9ae57e5f4884f309bb681a0670b743906bec9878673de5f1b83358745d57d7805b45ada0186da2fb2ed30816bbf3a5f9e84fdad09ba4e9ea6902cb2f82c680e4
-
SSDEEP
3072:30yM8tk0T5H3DpU8E8G1Bo69p6vwRjq6SxfUoMUCePb5chFs3KToau7XA+N/d7N:ISXDpgvoASlNyFWKTAX7td7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2624 2604 rundll32.exe 66 PID 2604 wrote to memory of 2624 2604 rundll32.exe 66 PID 2604 wrote to memory of 2624 2604 rundll32.exe 66 PID 1700 wrote to memory of 4028 1700 cmd.exe 72 PID 1700 wrote to memory of 4028 1700 cmd.exe 72 PID 4028 wrote to memory of 4544 4028 rundll32.exe 73 PID 4028 wrote to memory of 4544 4028 rundll32.exe 73 PID 4028 wrote to memory of 4544 4028 rundll32.exe 73 PID 1700 wrote to memory of 4088 1700 cmd.exe 74 PID 1700 wrote to memory of 4088 1700 cmd.exe 74 PID 4088 wrote to memory of 4260 4088 rundll32.exe 75 PID 4088 wrote to memory of 4260 4088 rundll32.exe 75 PID 4088 wrote to memory of 4260 4088 rundll32.exe 75
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Brmem_Profpllpdsp.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Brmem_Profpllpdsp.dll,#12⤵PID:2624
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\rundll32.exerundll32 Brmem_Profpllpdsp.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\rundll32.exerundll32 Brmem_Profpllpdsp.dll,#13⤵PID:4544
-
-
-
C:\Windows\system32\rundll32.exerundll32 Brmem_Profpllpdsp.dll,#22⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\rundll32.exerundll32 Brmem_Profpllpdsp.dll,#23⤵PID:4260
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\VideoLAN\VLC\NEWS.txt1⤵PID:3316
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce