Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 03:14

General

  • Target

    219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll

  • Size

    69KB

  • MD5

    5bb8ffdcffeb2cb29a5b294c7d8bba2f

  • SHA1

    53938777be7ec4d9b1b050d260485ab4c8ecd07f

  • SHA256

    219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47

  • SHA512

    4df5c16de5e23ec77e2f71e2fdf842ba1111875cecb69494b28f6644e7645ce1814a019271f2fddffeeb6314c55ea66c4d8a24ee1d90920f89f6fbd9fc9324f8

  • SSDEEP

    1536:Bm1NGJVGk5DToMUtfLw/MiBROzkejqFP75xGo1/qp84:kX0VtTopLwUiBvejQP7jP1Cp84

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\219004eb0a33db0034a3decf425ad1046349aa7b926d4de36bdd79fb1b3f4b47.dll,#1
      2⤵
        PID:1340

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1340-55-0x0000000076041000-0x0000000076043000-memory.dmp

            Filesize

            8KB