Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2023, 15:45

General

  • Target

    6cd2a1b3a5366d862a8c24c5693592f0f7783078f11ac333839144c4a2c8da3c.dll

  • Size

    972KB

  • MD5

    39947ae23307ad94517ad1632b00cd27

  • SHA1

    f34b20858f7e2e0f3a5f647f934e86777b19ee93

  • SHA256

    6cd2a1b3a5366d862a8c24c5693592f0f7783078f11ac333839144c4a2c8da3c

  • SHA512

    4e13f28bcb0d500b54cbf2ac9c5d6e682a9f63a821ae5e2cbea2ef209eaee180dc9ae63b82640a758d8f319359dbd40e75ffcc6905a4fe957b77efc87442cc41

  • SSDEEP

    12288:dIAETyZizswDZr2rnVed8b2NFCKh6RaG7EeDATbURJTdL7K2fzla:dI3AwDj02Nlh6IG7EeYU7TVW2fzla

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6cd2a1b3a5366d862a8c24c5693592f0f7783078f11ac333839144c4a2c8da3c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6cd2a1b3a5366d862a8c24c5693592f0f7783078f11ac333839144c4a2c8da3c.dll,#1
      2⤵
        PID:632

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads