Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 17:47

General

  • Target

    db78582e345c532d3158f4f4af2a1bf558673116f671062a0bc9f3b3f3ca6412.dll

  • Size

    470KB

  • MD5

    a8b1b97530e5fd171abb946b1b9cdfc0

  • SHA1

    0c8ae5e7ef0e46de37877a09f9c6730db67ef4e1

  • SHA256

    db78582e345c532d3158f4f4af2a1bf558673116f671062a0bc9f3b3f3ca6412

  • SHA512

    ba6ed045bd92f48fc11f23d4c5021d4d978b9dd24ed7997157665270b44c51311f2e17ae494fb96ae4507d7d06884a163b8a3668c167f7cd0b05ccf08d8d38ba

  • SSDEEP

    6144:yBNJq9OrVXl7HWrE+icB8aa36OCwb7eEk8vEE+MlP3dUONQyqRr1UJSRP9OagF5l:yB7jXVHGbKaW60b7eX8vEUNCNgTDu4

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\db78582e345c532d3158f4f4af2a1bf558673116f671062a0bc9f3b3f3ca6412.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\db78582e345c532d3158f4f4af2a1bf558673116f671062a0bc9f3b3f3ca6412.dll,#1
      2⤵
        PID:1792

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1792-55-0x0000000076321000-0x0000000076323000-memory.dmp

      Filesize

      8KB

    • memory/1792-56-0x0000000074CC0000-0x0000000074D09000-memory.dmp

      Filesize

      292KB

    • memory/1792-57-0x0000000074C70000-0x0000000074CB9000-memory.dmp

      Filesize

      292KB

    • memory/1792-58-0x00000000023D0000-0x00000000063D0000-memory.dmp

      Filesize

      64.0MB

    • memory/1792-59-0x0000000074CC0000-0x0000000074CD3000-memory.dmp

      Filesize

      76KB