Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    02-07-2023 17:09

General

  • Target

    Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll

  • Size

    4KB

  • MD5

    e2f86a5108d82182213299ba3f5965bb

  • SHA1

    67ea91ca639efc1748c79cfbaec8500724bbd203

  • SHA256

    9767d97779ae43bad6c313025b087fd8f23b1b8a40b91ff0acd1d9c2019ce579

  • SHA512

    2f57220475286fee2f51a7ded27f3ed9ad7dcd473dde37bf387289897328883867a1355b71cbeba98767c636205bd1ff7705e9ca5a8014c54112978737caf561

  • SSDEEP

    48:vpgLClZ7snpfV1cLfvf/EtWPblbjOsV2OLuZKQi3uYmRhHSQ:BVJQt1cbvfJpvV2wuZdi3uVRhHSQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Malicious_0b05f88df0fe1b052a79652c5ea4c12eb03454ecacefce1b0c8cefae0f9a538b.dll,#1
      2⤵
        PID:1684

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads