Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 19:41

General

  • Target

    b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll

  • Size

    32KB

  • MD5

    d74a25f7c58349a54018a2dd43030b1e

  • SHA1

    31847c1495f8f033587b2e4a65b00378d354f5f1

  • SHA256

    b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b

  • SHA512

    57b6885a28476ee430155a144601a2e6c62f99e4c9ccdc799d4d863cf3952dbda8bb18c11c7771063314ae48c3875498688cf1a9b647a0089bb7f4fed26cf40d

  • SSDEEP

    768:VqDM46EjQVubGebbo6H1HA8mj5H0P8sHX0tz:QDM46EjQVuyeI6VgnZU8kkz

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b647f1b89b51c7aa18e86042e9d3902c4cb7ab962d2112fb8e635ae4f8f1a55b.dll,#1
      2⤵
        PID:1948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1948-55-0x0000000075D71000-0x0000000075D73000-memory.dmp

      Filesize

      8KB

    • memory/1948-56-0x0000000010000000-0x0000000010018000-memory.dmp

      Filesize

      96KB