Analysis
-
max time kernel
0s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:55
Static task
static1
Behavioral task
behavioral1
Sample
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll
Resource
win10v2004-20220812-en
General
-
Target
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll
-
Size
424KB
-
MD5
b00765f779f1d5435f4c52d560834617
-
SHA1
444fe4cabde96f54aa2e260d51478762541ee6e5
-
SHA256
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533
-
SHA512
403e2fa8f5d85793a9399d7998d6269b1a64e1bf566e9bfcd09c25281e51ab3d80fb2f64e9a5cfa4e0b2724ce8d1d46046b224d5d4bc786d01c1fb6d77c4ffed
-
SSDEEP
6144:vopn97RMgON8vFK95OvZ6f32bPvcQWdmTqmNqthPBbt5a2gKh65wcl4crqg:voDlwN8vw5OumbPvqdHhpt5a2Vsd48q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1096 1228 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1096-54-0x0000000000000000-mapping.dmp
-
memory/1096-55-0x0000000075C41000-0x0000000075C43000-memory.dmpFilesize
8KB
-
memory/1096-56-0x0000000000230000-0x000000000029E000-memory.dmpFilesize
440KB
-
memory/1096-60-0x00000000001D0000-0x0000000000230000-memory.dmpFilesize
384KB