Analysis

  • max time kernel
    42s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:41

General

  • Target

    3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/IPLocal.dll

  • Size

    708KB

  • MD5

    8b1cc052a316b3d9c987638e090dc30c

  • SHA1

    8a786247ed4b8e3b3b23894a40a2662bb6bb864b

  • SHA256

    ec68caf90c61e2c3620154c562f306d3104c99855ee2d6cb40a390003cc21c13

  • SHA512

    fd8f4f5f73756472268acff656b3064858d5dbd98643d2bac27eac4ac23ea51cae30bcabc3a209d466cec72c634e4de06f93345eae49d864e596a3a5c67f3674

  • SSDEEP

    6144:wacWxKtTHt9kwZ7oCSr/eu+zYJfnWV3j8MXSnkxHepk1NHwgIDLL5fKH+c:wacWxoN9kwZMCl3j8xn0+pk15ghfKT

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\IPLocal.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\IPLocal.dll,#1
      2⤵
        PID:1708

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1708-55-0x0000000075711000-0x0000000075713000-memory.dmp

      Filesize

      8KB

    • memory/1708-56-0x0000000001F60000-0x0000000002095000-memory.dmp

      Filesize

      1.2MB

    • memory/1708-57-0x00000000001E0000-0x0000000000244000-memory.dmp

      Filesize

      400KB

    • memory/1708-62-0x00000000001E1000-0x0000000000216000-memory.dmp

      Filesize

      212KB