Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04-06-2023 04:22
Behavioral task
behavioral1
Sample
008f581a0768e6be9b82e90d1750d74db1cf6ac49bc635841af1eb605cd448d4.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
008f581a0768e6be9b82e90d1750d74db1cf6ac49bc635841af1eb605cd448d4.dll
Resource
win10v2004-20230220-en
General
-
Target
008f581a0768e6be9b82e90d1750d74db1cf6ac49bc635841af1eb605cd448d4.dll
-
Size
1.9MB
-
MD5
cd90848d7a84e57948ef660a54c9d7aa
-
SHA1
6acab92162b8dd1363fd42ef07b555aa8f970a67
-
SHA256
008f581a0768e6be9b82e90d1750d74db1cf6ac49bc635841af1eb605cd448d4
-
SHA512
0fb5e65d681a4de09e4b60f107b1b80e38e5ec66009e6683cb4088b2d03248533b0b0a7f313600b500eba6299ef41abb67efbd18cd9ce2850fc1625229d0ff85
-
SSDEEP
49152:SN6QmKktYBURbFcJxigZbi7I5Cp9IaXTH7HyN2:iBQ2+gxe7I4H7HyM
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1168 2044 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\008f581a0768e6be9b82e90d1750d74db1cf6ac49bc635841af1eb605cd448d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\008f581a0768e6be9b82e90d1750d74db1cf6ac49bc635841af1eb605cd448d4.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1168-54-0x0000000074070000-0x0000000074696000-memory.dmpFilesize
6.1MB
-
memory/1168-55-0x0000000073A40000-0x0000000074066000-memory.dmpFilesize
6.1MB
-
memory/1168-56-0x0000000000700000-0x000000000074B000-memory.dmpFilesize
300KB
-
memory/1168-58-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/1168-60-0x00000000008B0000-0x00000000008B1000-memory.dmpFilesize
4KB
-
memory/1168-57-0x0000000000870000-0x0000000000871000-memory.dmpFilesize
4KB
-
memory/1168-61-0x0000000000850000-0x0000000000851000-memory.dmpFilesize
4KB
-
memory/1168-63-0x0000000000830000-0x0000000000831000-memory.dmpFilesize
4KB
-
memory/1168-59-0x00000000007E0000-0x00000000007E1000-memory.dmpFilesize
4KB
-
memory/1168-62-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/1168-64-0x00000000027B0000-0x00000000027B2000-memory.dmpFilesize
8KB