Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 13:02

General

  • Target

    397fe7ac6499bb6c4737e85cff63d0b42b74647ea92fcf06b3c3e2f185adb45a.dll

  • Size

    70KB

  • MD5

    69f17355bdaf26838feaa32376ae5ae6

  • SHA1

    911ad9b88c4f8b9daa7744523d21e3f62bc26a65

  • SHA256

    397fe7ac6499bb6c4737e85cff63d0b42b74647ea92fcf06b3c3e2f185adb45a

  • SHA512

    a7169f429c805caeeae215b7beda7f32a51a85331b8a1630747f2f969c9aa20dce3fa37d80996d8b1b5abda872ff743ded05067fa83b97d797a02b80286d8ac2

  • SSDEEP

    1536:EkL0PLvb+zMVu34wtR03PTquJu71bxLRkBfGyBMUpaW:F0bbY34wt8P+dtgGaMW

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\397fe7ac6499bb6c4737e85cff63d0b42b74647ea92fcf06b3c3e2f185adb45a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\397fe7ac6499bb6c4737e85cff63d0b42b74647ea92fcf06b3c3e2f185adb45a.dll,#1
      2⤵
        PID:1100

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1100-55-0x00000000759F1000-0x00000000759F3000-memory.dmp

      Filesize

      8KB

    • memory/1100-56-0x0000000013000000-0x000000001302E000-memory.dmp

      Filesize

      184KB

    • memory/1100-57-0x0000000013000000-0x000000001302E000-memory.dmp

      Filesize

      184KB