Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2023 08:54

General

  • Target

    42cd0fca835aaa28786e4aae3ec5c18fa222083cd970be145ed60c3972fbbaf8.dll

  • Size

    899KB

  • MD5

    7add45fb6fcfa1ba4748161b973e6a3f

  • SHA1

    b556b195ae9792818ecdab54adc03fdf7ebd1c60

  • SHA256

    42cd0fca835aaa28786e4aae3ec5c18fa222083cd970be145ed60c3972fbbaf8

  • SHA512

    64af65ff864da8d086a4b5134396c5150707d242659137055b9d3be3efe7f087d32e4ce9ff8bb606c7fb195d7ab57697be4e81a3f8d743dc5a9e8507f150c22b

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXg:7wqd87Vg

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\42cd0fca835aaa28786e4aae3ec5c18fa222083cd970be145ed60c3972fbbaf8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\42cd0fca835aaa28786e4aae3ec5c18fa222083cd970be145ed60c3972fbbaf8.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1488

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads