Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 21:59
Behavioral task
behavioral1
Sample
339cd5eaa3e23d3f93ea822b4196d829998998df17666fe4845d98da17e9251e.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
339cd5eaa3e23d3f93ea822b4196d829998998df17666fe4845d98da17e9251e.dll
Resource
win10v2004-20230220-en
General
-
Target
339cd5eaa3e23d3f93ea822b4196d829998998df17666fe4845d98da17e9251e.dll
-
Size
2.1MB
-
MD5
b8d85d7ec192b43509503d201f58adbd
-
SHA1
6362ea9a9c845c55df76ce4f665b5c0221490aa4
-
SHA256
339cd5eaa3e23d3f93ea822b4196d829998998df17666fe4845d98da17e9251e
-
SHA512
526b91ec9f4fd5e366c6315ebfa898521af06a3e80e9d56d611bf4aeab4af69b5203fea5f3b5008f9bc383ead570a6938b9e62f89a41bedc16ea7db1ff2b7865
-
SSDEEP
49152:C4tjkjdLQ84Kq5oacDT4YClHRoCCyhhFwAXjSwl9zf6rlF8:C41kj5Q8475oac3XiyyhT3zSi9e8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 2040 1744 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\339cd5eaa3e23d3f93ea822b4196d829998998df17666fe4845d98da17e9251e.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\339cd5eaa3e23d3f93ea822b4196d829998998df17666fe4845d98da17e9251e.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2040-54-0x0000000002040000-0x000000000266F000-memory.dmpFilesize
6.2MB