Analysis

  • max time kernel
    36s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 02:30

General

  • Target

    18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll

  • Size

    285KB

  • MD5

    755c09a2bd28d200065323dc7ad2e6b0

  • SHA1

    dc365512854f656bcc6b6a86b6f3671ae38b8a38

  • SHA256

    18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d

  • SHA512

    3829851c66988d5bd85a0325d4b80496918af6f97d337dbcfb4296e6f5cb089312c8c0ed54013d1c353f9b209eea88dbfc67dfdced4872421133f6614c645e59

  • SSDEEP

    6144:JB9OCh1IOOcPWSMOjLWNuDB+j05tpJUJafY3/G:JB9O7jwWS4Aj6kYO

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll,#1
      2⤵
        PID:1580

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1580-55-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

            Filesize

            8KB

          • memory/1580-56-0x0000000074CB0000-0x0000000074CFB000-memory.dmp

            Filesize

            300KB

          • memory/1580-57-0x0000000074C60000-0x0000000074CAB000-memory.dmp

            Filesize

            300KB