Analysis
-
max time kernel
184s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:55
Static task
static1
Behavioral task
behavioral1
Sample
49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll
Resource
win7-20220812-en
2 signatures
150 seconds
General
-
Target
49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll
-
Size
309KB
-
MD5
edc236c595a5c76ead85eff84ba2bbb0
-
SHA1
cc13d25779817bd404a906bae86ffde1e7975bbe
-
SHA256
49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e
-
SHA512
71e1a2c24e7a402fb43f949c4ff33e5b36a215601e19e6cd6909a036e7f2884b532651cdd5a434bb9883cb17f1aa233ca0cb4fd27a574d00c6d99238b4b3538e
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0S:jDgtfRQUHPw06MoV2nwTBlhm8K
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1936 wrote to memory of 3040 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 3040 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 3040 1936 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3040-132-0x0000000000000000-mapping.dmp