Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 04:02

General

  • Target

    5225feabc1263ed8516d1f850aa6509f54a4306c53c2eee3f4a115336f1c4e1b.dll

  • Size

    201KB

  • MD5

    6587da85a7bbdb624144684257bb51ab

  • SHA1

    7701832a94dbe39bccda5a94bda37c690c06be47

  • SHA256

    5225feabc1263ed8516d1f850aa6509f54a4306c53c2eee3f4a115336f1c4e1b

  • SHA512

    5f60299ff72a2d4a7c9dfd66381fd92b78dbcb3225a3f221c9fab3e490c4168b6e059c1c5d9e51a0e34d2260ad308d07f133d03e2f2222b80fd491d18b33427c

  • SSDEEP

    1536:+tWapMAP4VmjW/YwuCP3HgVAIw8JaTymVyKbDjbm7IC7C52enchZG4NAMmKkgjNY:YWapMN+YhTy69bDeIC7E2enc3mKkCDal

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5225feabc1263ed8516d1f850aa6509f54a4306c53c2eee3f4a115336f1c4e1b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5225feabc1263ed8516d1f850aa6509f54a4306c53c2eee3f4a115336f1c4e1b.dll,#1
      2⤵
        PID:2592

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads