Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 19:47

General

  • Target

    e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll

  • Size

    74KB

  • MD5

    69b2e1fd5dcdf3c68c4a6062cf48c080

  • SHA1

    133bb66ea8532354790711942f42dbcd8a9df1ff

  • SHA256

    e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297

  • SHA512

    2149fd8b68a8f63c58f511459486d02e33c53f6808debde2935a87dc6070bc21682291d25374bddfba45fc8d22b90104f22e5e123b24a81c1b50425a33eb212c

  • SSDEEP

    1536:LszMRUysuz6wzEYLNqBNBGLGVca8EC9HexOBpln1IpIz4KHFbMMvg:L6PdwIkaN0ba8WxUaKMcBe

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e2973965e59803a417bdfda1dcd4d1ca52f826624febeb5a9aa8b2df06768297.dll,#1
      2⤵
        PID:1704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1704-55-0x0000000075201000-0x0000000075203000-memory.dmp

      Filesize

      8KB