Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 17:04

General

  • Target

    e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll

  • Size

    1.3MB

  • MD5

    fd6524d388164ac9e454796177341d6a

  • SHA1

    a81896aab990999cd9878ddbcc012d7a8343d212

  • SHA256

    e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7

  • SHA512

    7308b7f31901a80bea0a93c414a277f5f62d936f068e549d70e0f64eb21654958de9c2573cec22182c84b277e74d37ee6fb90581fe160bbdfc288820abe6cebc

  • SSDEEP

    24576:XY4ixXpFM0HdAB7l3C0FZhmftqsC2MTD4IkYNYCM8Yl2WVpT1qJ42xLFaRTqFL8Q:IThpFKBWssCZNY2zM2GVqFr

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:1396

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1396-55-0x00000000752B1000-0x00000000752B3000-memory.dmp

    Filesize

    8KB

  • memory/1396-56-0x0000000010000000-0x0000000010394000-memory.dmp

    Filesize

    3.6MB