Analysis

  • max time kernel
    27s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:41

General

  • Target

    e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll

  • Size

    5KB

  • MD5

    3e1c7f67ed90e4f7f7f906ea0ff0c520

  • SHA1

    0611d90da98184c625d82c9c560e93b1085f5384

  • SHA256

    e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c

  • SHA512

    a37926050231d248cda99692d4501b597a1d1abb851a2eae020b76f5df2409bd970b6361f32b9b48cb1b088b8b225f48f94b8f46ab23b6996ad6a5737857235b

  • SSDEEP

    96:nEY2RrF1eqwi4SUSsvJgUJ2AFKzcYYSj/:EHRh1epp/SAJgv22cq/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll,#1
      2⤵
        PID:2036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2036-55-0x0000000075C21000-0x0000000075C23000-memory.dmp

      Filesize

      8KB