Analysis
-
max time kernel
186s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 06:21
Static task
static1
Behavioral task
behavioral1
Sample
7747c51dddd1e3ea1ee6eb9ddab7016bcf66f694f096cdd8178eacf5e4dd6480.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7747c51dddd1e3ea1ee6eb9ddab7016bcf66f694f096cdd8178eacf5e4dd6480.dll
Resource
win10v2004-20221111-en
General
-
Target
7747c51dddd1e3ea1ee6eb9ddab7016bcf66f694f096cdd8178eacf5e4dd6480.dll
-
Size
91KB
-
MD5
91da6579b3e8ee2164c66cfb8136906a
-
SHA1
0c29ad063c7ff3df1e72594d28bb919f3de243ce
-
SHA256
7747c51dddd1e3ea1ee6eb9ddab7016bcf66f694f096cdd8178eacf5e4dd6480
-
SHA512
2534751272f96df24fb12877f52c81ca47b2296477316941a9ff6384400dbdd7c5b390e5cf9b984da5b962e663c800709b73a2eae971fea52662a8fbd804ec8f
-
SSDEEP
1536:j68HQKyGMqK7g6lKe+VG9rESE7AxfXkpKTz1Enj19U7PWSwoW2CWd2/++K2veWKj:O8Hkl7g6Qe+VGlF+6vTXPWSz2/+DLj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1332 wrote to memory of 4228 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 4228 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 4228 1332 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7747c51dddd1e3ea1ee6eb9ddab7016bcf66f694f096cdd8178eacf5e4dd6480.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7747c51dddd1e3ea1ee6eb9ddab7016bcf66f694f096cdd8178eacf5e4dd6480.dll,#12⤵PID:4228
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4228-132-0x0000000000000000-mapping.dmp