Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 10:48

General

  • Target

    7c1f67714d2f3db56f4b9261c2bd2e829f244cae8a3a2f423a61b7329172aa61.dll

  • Size

    899KB

  • MD5

    4d09b969210cfbf0dc79f2e30b5e3d2b

  • SHA1

    8cd663528b5768deca00a083be4acfc5a65bda29

  • SHA256

    7c1f67714d2f3db56f4b9261c2bd2e829f244cae8a3a2f423a61b7329172aa61

  • SHA512

    9c3da83bfb8feb35eb34a9289605eb57d99c3c9ff9ce5f1cf67697692d316eb5baca94f3aad40eafa9f3ff497103f688a2b049b1cd3b5ef836828a02a06bb4b6

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXs:7wqd87Vs

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7c1f67714d2f3db56f4b9261c2bd2e829f244cae8a3a2f423a61b7329172aa61.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7c1f67714d2f3db56f4b9261c2bd2e829f244cae8a3a2f423a61b7329172aa61.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads