Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 07:59
Behavioral task
behavioral1
Sample
5da2fff039a1b7e9ce243e7e5e36dc53f35eafc11ceb227c4b7f684bca61c9b0.dll
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5da2fff039a1b7e9ce243e7e5e36dc53f35eafc11ceb227c4b7f684bca61c9b0.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
5da2fff039a1b7e9ce243e7e5e36dc53f35eafc11ceb227c4b7f684bca61c9b0.dll
-
Size
138KB
-
MD5
73d3c2095624837d48f049df3831b467
-
SHA1
735e0d574a172f8f46ff76f23d71a1680a7d9b84
-
SHA256
5da2fff039a1b7e9ce243e7e5e36dc53f35eafc11ceb227c4b7f684bca61c9b0
-
SHA512
989bd1bceddd842f4683a4151e70fe519b85108b56eba0b7b4c11873c5abef036ff88286b3db800ecdfbdbc34887545881952304d2fcc441d804833846da5f51
-
SSDEEP
3072:qnOGVzI9N94Q5EDOsPHzcTjcA2aJp5aljBn4C9pd:eZI9/DYOsoTIAfJMb9p
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2016 wrote to memory of 1300 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 1300 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 1300 2016 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5da2fff039a1b7e9ce243e7e5e36dc53f35eafc11ceb227c4b7f684bca61c9b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5da2fff039a1b7e9ce243e7e5e36dc53f35eafc11ceb227c4b7f684bca61c9b0.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1300-133-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB