Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 10:58

General

  • Target

    b5c13f8cb4acbc87561c81d79d7a6e0270862ac1831ba38c13474af5ad841ed0.dll

  • Size

    899KB

  • MD5

    cddc8d12e600b7322d66bcf4a83ac14b

  • SHA1

    82ef454d06d850a5ef0d9518bb7a34be9ac65498

  • SHA256

    b5c13f8cb4acbc87561c81d79d7a6e0270862ac1831ba38c13474af5ad841ed0

  • SHA512

    1762f273fba598e8e1db72ee45468bd7fb98518aa4ae264e22f4df04b53df9587dd87bd74dadc362d53fbd4ae05b6492e3bf4f9d686405765edeb07320c3b545

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXZ:7wqd87VZ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b5c13f8cb4acbc87561c81d79d7a6e0270862ac1831ba38c13474af5ad841ed0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b5c13f8cb4acbc87561c81d79d7a6e0270862ac1831ba38c13474af5ad841ed0.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2584

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads