Analysis

  • max time kernel
    31s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 21:35

General

  • Target

    a8f76a957d81434997b39aeebfa0f12ab83908fe81adee7771192452e9e81b87.dll

  • Size

    20KB

  • MD5

    e4396522a1dc6a8571046337a7592528

  • SHA1

    7686e59bf8dac9263fde0b68f3233f47ff8d8d6e

  • SHA256

    a8f76a957d81434997b39aeebfa0f12ab83908fe81adee7771192452e9e81b87

  • SHA512

    446da6ceacf5a7cdcdc8c5b76bfc473add83373298b27fa5196708bb8343e2c179c6c407a19c1b0152fb66d288efcd2d4f44a0a2c39241795bf3ee46c9289597

  • SSDEEP

    384:zSG/2Jp+C6QhtmruxCcdIL+0XplcejCAu8UaWHuqaTlX0wG:zfYh2oCtpXPcCx2OqaewG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a8f76a957d81434997b39aeebfa0f12ab83908fe81adee7771192452e9e81b87.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a8f76a957d81434997b39aeebfa0f12ab83908fe81adee7771192452e9e81b87.dll,#1
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9696.tmp

    Filesize

    20KB

    MD5

    67516c8ff456fe128b9314bb45db7705

    SHA1

    aa2428b3b5725bac20ca63c09f6b81a87a4e2006

    SHA256

    db3c66275324fe087e9d6f67062fc866f734ae8d1cdb7c1ba1e264f98b87ed57

    SHA512

    160b192ae49332f369ba7759e887293d860aadd8b3a562976f1dcac310433514ff5f82e3baefcd4bd2057f628ac3615f3e227996150712bab7b59dcda2ade4af

  • memory/2032-55-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB