Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 18:53
Behavioral task
behavioral1
Sample
8ea4ce43273bb99c012f0aef0b071dc72e80da64dc999a543410861b03995d01.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ea4ce43273bb99c012f0aef0b071dc72e80da64dc999a543410861b03995d01.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
8ea4ce43273bb99c012f0aef0b071dc72e80da64dc999a543410861b03995d01.dll
-
Size
1.7MB
-
MD5
7b3621b2a1a850425e3544e1c4fdb572
-
SHA1
a1260b298bcc3f28f02638d728b1d5c340206145
-
SHA256
8ea4ce43273bb99c012f0aef0b071dc72e80da64dc999a543410861b03995d01
-
SHA512
50fa3a1c8ff14ef202161c77830b3dfe2581f5a42daa1143fe9353ef424ecb93059022fab5e0b40391cdaa481a881992acb302c287e0b01b31300ae89b4d4d73
-
SSDEEP
49152:/NnX+yxAGbQ5bFcJxigZbFsKqroH+/TH70B4:lAgx5sproeLH70B
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1052 856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ea4ce43273bb99c012f0aef0b071dc72e80da64dc999a543410861b03995d01.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ea4ce43273bb99c012f0aef0b071dc72e80da64dc999a543410861b03995d01.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1052-54-0x0000000000000000-mapping.dmp
-
memory/1052-55-0x0000000076151000-0x0000000076153000-memory.dmpFilesize
8KB
-
memory/1052-56-0x0000000074420000-0x00000000747E0000-memory.dmpFilesize
3.8MB
-
memory/1052-57-0x00000000747E0000-0x0000000074BA0000-memory.dmpFilesize
3.8MB