Analysis

  • max time kernel
    148s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 14:41

General

  • Target

    3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/IPLocal.dll

  • Size

    708KB

  • MD5

    8b1cc052a316b3d9c987638e090dc30c

  • SHA1

    8a786247ed4b8e3b3b23894a40a2662bb6bb864b

  • SHA256

    ec68caf90c61e2c3620154c562f306d3104c99855ee2d6cb40a390003cc21c13

  • SHA512

    fd8f4f5f73756472268acff656b3064858d5dbd98643d2bac27eac4ac23ea51cae30bcabc3a209d466cec72c634e4de06f93345eae49d864e596a3a5c67f3674

  • SSDEEP

    6144:wacWxKtTHt9kwZ7oCSr/eu+zYJfnWV3j8MXSnkxHepk1NHwgIDLL5fKH+c:wacWxoN9kwZMCl3j8xn0+pk15ghfKT

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\IPLocal.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\IPLocal.dll,#1
      2⤵
        PID:4524

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4524-133-0x0000000002D40000-0x0000000002DA4000-memory.dmp

      Filesize

      400KB

    • memory/4524-138-0x0000000002D41000-0x0000000002D76000-memory.dmp

      Filesize

      212KB