Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:02
Static task
static1
Behavioral task
behavioral1
Sample
99af68adf9874f5bf5efae9de6b001a934441be1d2acf554aa2e5390d2e91807.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99af68adf9874f5bf5efae9de6b001a934441be1d2acf554aa2e5390d2e91807.dll
Resource
win10v2004-20220901-en
General
-
Target
99af68adf9874f5bf5efae9de6b001a934441be1d2acf554aa2e5390d2e91807.dll
-
Size
331KB
-
MD5
0069c527133dffc3f0ecf0796ec93845
-
SHA1
6599eaa2e7edb0a52c5168610f4c0e0b4c571f78
-
SHA256
99af68adf9874f5bf5efae9de6b001a934441be1d2acf554aa2e5390d2e91807
-
SHA512
b5fdf4e997e764d3226d76b5fc8e6e965af80e8a2826ef16c93117beb1eca91db32ace26bc7f54586e5c70c3bd44363493a78b39b4cc33be0b1a22f00b35368c
-
SSDEEP
6144:Ru/nbMxQylt87Cqi/zznv4sGA8sxWae6u2Bya/rtU61I+AK3uK6HxjnLJtQodWiK:E/bMhtBqWLus4ae6lyap1I+Ayu7Hxjna
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 2004 1280 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99af68adf9874f5bf5efae9de6b001a934441be1d2acf554aa2e5390d2e91807.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99af68adf9874f5bf5efae9de6b001a934441be1d2acf554aa2e5390d2e91807.dll,#12⤵PID:2004
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2004-54-0x0000000000000000-mapping.dmp
-
memory/2004-55-0x0000000075811000-0x0000000075813000-memory.dmpFilesize
8KB
-
memory/2004-56-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2004-57-0x0000000040960000-0x0000000040971000-memory.dmpFilesize
68KB