Analysis

  • max time kernel
    91s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 04:35

General

  • Target

    a086fd9dc37e104d8a9d87db92ce9449b971b167fa2bc75e64e0a1cc628a30d8.dll

  • Size

    35KB

  • MD5

    d2ff4feb1a2d90464c7d475c057a0cb7

  • SHA1

    955cafe35c997041562631556404490252142060

  • SHA256

    a086fd9dc37e104d8a9d87db92ce9449b971b167fa2bc75e64e0a1cc628a30d8

  • SHA512

    87190009f7f3ddf0c5191aa60066d33ad9bf51a0a64a18c4be66d4f6710bc5d7ad888b8e06a182adb0d0fb4d22bfadd4097c9c91d5c5ed21292209423a21a8cf

  • SSDEEP

    384:Vxw6CL9YMSyIS8st4rVUyzWTNk2/HysQgD77+6HTHICawCJFX9W+RkhfODP:VHCSyIS1t4j2Z/tD7zH8ChwZ9vRAs

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a086fd9dc37e104d8a9d87db92ce9449b971b167fa2bc75e64e0a1cc628a30d8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a086fd9dc37e104d8a9d87db92ce9449b971b167fa2bc75e64e0a1cc628a30d8.dll,#1
      2⤵
        PID:548

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/548-55-0x00000000763A1000-0x00000000763A3000-memory.dmp

      Filesize

      8KB