Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-02-2023 20:26
Behavioral task
behavioral1
Sample
566ddc62429279dcecea983a6e86fd47b854e3ee09555e4cc023a2b7733a111d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
566ddc62429279dcecea983a6e86fd47b854e3ee09555e4cc023a2b7733a111d.dll
Resource
win10v2004-20220812-en
General
-
Target
566ddc62429279dcecea983a6e86fd47b854e3ee09555e4cc023a2b7733a111d.dll
-
Size
1.6MB
-
MD5
ef1ef76cb0fbd2eb18a728daf7585888
-
SHA1
e78ad6ad410f8cabf0336be832a6efbde580cebe
-
SHA256
566ddc62429279dcecea983a6e86fd47b854e3ee09555e4cc023a2b7733a111d
-
SHA512
836054b864c9d3bb27e3334ea4fc1eec9ffaa6196447bb39e459a6d680c38c4d7d5abb762eeedbfa39c2a4de679ec9403442a365412d911e4dcf1630e83bfaf5
-
SSDEEP
24576:V7HbEgxpCFOuBaiUsJH5+6U3JD/G8pjsyYNK6rdvOUEqcAK5Cvt3jUd17gnj:V7HbETQMCi46UZTiNK6rdDACVjKZy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe PID 1464 wrote to memory of 816 1464 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\566ddc62429279dcecea983a6e86fd47b854e3ee09555e4cc023a2b7733a111d.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\566ddc62429279dcecea983a6e86fd47b854e3ee09555e4cc023a2b7733a111d.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/816-54-0x0000000000000000-mapping.dmp
-
memory/816-55-0x00000000758B1000-0x00000000758B3000-memory.dmpFilesize
8KB
-
memory/816-56-0x00000000020F0000-0x000000000266F000-memory.dmpFilesize
5.5MB
-
memory/816-57-0x0000000000200000-0x0000000000260000-memory.dmpFilesize
384KB
-
memory/816-58-0x00000000020F0000-0x000000000266F000-memory.dmpFilesize
5.5MB
-
memory/816-59-0x0000000000200000-0x0000000000260000-memory.dmpFilesize
384KB