Analysis

  • max time kernel
    153s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 01:24

General

  • Target

    9025d7b18fa384c863a4ad3c199276fa549556787467ae8a6dae79ede3eab0aa.dll

  • Size

    149KB

  • MD5

    d3fe6a2bc4e05d764e0457306e0d4820

  • SHA1

    95f457770633ceb23b9c7ab3b655a51d459d32a0

  • SHA256

    9025d7b18fa384c863a4ad3c199276fa549556787467ae8a6dae79ede3eab0aa

  • SHA512

    00d419d1a9dfb1d67dbe431446debabd6627d7b2d8bacdc95ac6039d6382d4e7dfa21a510a9f16d80b3ca7456884df56d34f0f4d27a7826febd906b0071fff00

  • SSDEEP

    3072:9lEJQs4qPKM5B0/L33joz5bJ1D7s/p9G9UN8vizAOuLhCtaY/E:9lEisRKM5OTzo79sTqSGqVwh

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9025d7b18fa384c863a4ad3c199276fa549556787467ae8a6dae79ede3eab0aa.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9025d7b18fa384c863a4ad3c199276fa549556787467ae8a6dae79ede3eab0aa.dll,#1
      2⤵
        PID:1620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-55-0x0000000075C81000-0x0000000075C83000-memory.dmp

      Filesize

      8KB

    • memory/1620-56-0x00000000001A0000-0x00000000001B3000-memory.dmp

      Filesize

      76KB

    • memory/1620-57-0x0000000000260000-0x0000000000288000-memory.dmp

      Filesize

      160KB

    • memory/1620-61-0x00000000001A0000-0x00000000001B3000-memory.dmp

      Filesize

      76KB