Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 19:33
Behavioral task
behavioral1
Sample
10862968fe8c9ba8a52709f6e49b2f768f263c5ab66a1cdbc08785959604c3ec.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
10862968fe8c9ba8a52709f6e49b2f768f263c5ab66a1cdbc08785959604c3ec.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
10862968fe8c9ba8a52709f6e49b2f768f263c5ab66a1cdbc08785959604c3ec.dll
-
Size
118KB
-
MD5
3b2e4ccb2e938078c61888e8ea2b8d09
-
SHA1
32b88e500553926e45a4d76cf5b993fa95164927
-
SHA256
10862968fe8c9ba8a52709f6e49b2f768f263c5ab66a1cdbc08785959604c3ec
-
SHA512
22a5f80d1fa856e792ae6ede6196255a18dc27cdb3cd10953a03e28364e570d9a03bb794b574e286c95d3983b6689e283d67e23a3950a4334e0ab914ad9f8ed2
-
SSDEEP
3072:Dc8uEVNGLKZgPwmyrb14a++ApZKS1XULNRaLlhDefVh:gFINGq314a+PFZR/
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2564 wrote to memory of 1964 2564 rundll32.exe rundll32.exe PID 2564 wrote to memory of 1964 2564 rundll32.exe rundll32.exe PID 2564 wrote to memory of 1964 2564 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10862968fe8c9ba8a52709f6e49b2f768f263c5ab66a1cdbc08785959604c3ec.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10862968fe8c9ba8a52709f6e49b2f768f263c5ab66a1cdbc08785959604c3ec.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1964-132-0x0000000000000000-mapping.dmp
-
memory/1964-133-0x0000000010000000-0x000000001004B000-memory.dmpFilesize
300KB
-
memory/1964-135-0x0000000010000000-0x000000001004B000-memory.dmpFilesize
300KB
-
memory/1964-134-0x0000000010000000-0x000000001004B000-memory.dmpFilesize
300KB