Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2023 18:51

General

  • Target

    53ea011bc4b29fba2ebb0594647456caf27353b33073ce4b72c318f2fe95540e.dll

  • Size

    1.1MB

  • MD5

    401427c99277b9ebfb7881d0d2653d17

  • SHA1

    1fb5484227646f0a435b5ffc393027f1f4f71c79

  • SHA256

    53ea011bc4b29fba2ebb0594647456caf27353b33073ce4b72c318f2fe95540e

  • SHA512

    38d6e3709a2130970b2048d3218f57b6866bd3b4fde506c5bec57259e88720f35be8f8cc1ada32bf1f190315ebe2dc7c8f6b518d637dd5cc3c3641468e86ff4e

  • SSDEEP

    24576:+PDs6UyyGW/rwBxN3llX/vZe/IlaJdjKT172O74RJugoSg1IaZ:+L86xN1p/xonJdE7R4RJugol1IaZ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\53ea011bc4b29fba2ebb0594647456caf27353b33073ce4b72c318f2fe95540e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\53ea011bc4b29fba2ebb0594647456caf27353b33073ce4b72c318f2fe95540e.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:1192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\U2PG0X5O.htm

    Filesize

    377KB

    MD5

    f0e3680c4035439469b544ee4c4268c1

    SHA1

    c1d7a38b8362d5bf1d8cedbff0f919f64f5f9d48

    SHA256

    957d70e0b41c1f84b234650e2d765d8c54d9263f1dc01561c8afb5375115c080

    SHA512

    1b292fded9204df9f96b3b5d9b125a8c199678eab31cf4fbce4a2d9410857a656638d6f0c473e5353cb5aaa0b4ea7c999d30503ad258c92da638309c94dc5600