Analysis

  • max time kernel
    39s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 03:52

General

  • Target

    025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll

  • Size

    63KB

  • MD5

    5a070f69485cf50b21055348d7f17e14

  • SHA1

    82c5520926af77755f2086e3f411616a7c081a9b

  • SHA256

    025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa

  • SHA512

    c86c5619913c8b667e131551773abb39c4d6e184f29803f211d7b7e97ac8277b2a3eb7e394617be3e67b9fb4fac5f61eeb76bda9dc9feab0c1ca6a957f268bc9

  • SSDEEP

    1536:UiFmLzKazhaMh3P9qsXKsW+suE96lPDtxCaTmUz6bC:UzzKmjlqsxW+sJklJxCa96bC

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\025da120fbc465a864c56fac2583fb4bc8a302d324667ba8d5da1ba13b3e7baa.dll,#1
      2⤵
        PID:1144

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1144-55-0x0000000075881000-0x0000000075883000-memory.dmp

            Filesize

            8KB