Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-04-2023 21:17

General

  • Target

    7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll

  • Size

    308KB

  • MD5

    7d65acaeb3f88c463a7e05846e8c5f5c

  • SHA1

    25e6593e54a663ee02d7c9af6e97d45f922aa40d

  • SHA256

    7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43

  • SHA512

    edd7b91a8688ddf2875e223cee4d1454464c9b12a4d524d6f54278f11f2e54cfd50f578ed6ee92d253cce6b57858b5a5b4e1213faa5c6c4f2a0e424b8e58669f

  • SSDEEP

    6144:zhIRcUwV+KN9meCAQARgoXnF0u/utFjoqcDSRXVyHDff2bp6+h4OoVicAEqI2W:zyRoN9meCAQARgoX2u/utF8qcD0FGfM/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7eb92cdc45a49fbd1c3532c8d2113464f86a5507db6823b6baf7905aace19a43.dll,#1
      2⤵
        PID:1172

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads