Analysis

  • max time kernel
    2s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 21:48

General

  • Target

    c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll

  • Size

    6KB

  • MD5

    e524a2bb032689d9c526241f3a6c1720

  • SHA1

    e7c37569eade6a271d163ea269958b6596f83d3f

  • SHA256

    c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889

  • SHA512

    e2930344cbfc7c9500f96a56b6587d805e80c14a9f8bc3d8cb98bd60b7549a2f05b02c20a5b4f377a952e54eb4bc8f5524ecc83632e1f33dca2f662448dad4f8

  • SSDEEP

    48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHh1HIkxG3xE4G9oiU6zy:nEY2RrF1eqwi4jHIkxG3xE4G9oiU6zy

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll,#1
      2⤵
        PID:972

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/972-55-0x0000000074D81000-0x0000000074D83000-memory.dmp

      Filesize

      8KB