Analysis

  • max time kernel
    28s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 01:43

General

  • Target

    c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll

  • Size

    14KB

  • MD5

    a2cd5f992f6ea8bd922ba101157cf36b

  • SHA1

    6f12e2922dd58ce388feada599d31844a4d1e561

  • SHA256

    c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85

  • SHA512

    41ada227142af643888c10ec17f3a6907251d4957c63bb2247cb9ae28b8a4164dd0f795bd7148febe7d37de0046f9d2ca2b69f161eceeb4c9a94ff16530e28ae

  • SSDEEP

    192:SrGTRW3l0vdV+w/cwA1IZET6mbNKUSNh8MRhHPzR67fIOsyr6MNE2E8lNiWglt:SrUY2vDFUwCIwbWlRJ9GIzynE2hNQlt

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c705e8a7f5b29622d768f066b8b6872aeb477eb4ee9d7ca10b7ca7941c86cc85.dll,#1
      2⤵
        PID:1948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1948-55-0x0000000075091000-0x0000000075093000-memory.dmp

      Filesize

      8KB

    • memory/1948-56-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB