Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2023, 05:40

General

  • Target

    9205817b0c4ff557c4eef411be2d80641e42b04e0310ba320bd09247f01fff4e.dll

  • Size

    899KB

  • MD5

    7d706d507d5ffcebe2e6e81ed50b3c44

  • SHA1

    be839c021706f95ee97fdc91b0ab0b41dee27dca

  • SHA256

    9205817b0c4ff557c4eef411be2d80641e42b04e0310ba320bd09247f01fff4e

  • SHA512

    8bb98e0262d7fcf774f2a42c242550b20ea80fb42cffe9d200cbbe27d38b23cc8e31cfead54a35e0a219de4b30026cf67620436dc06e2bc9602bd0bd9adc7000

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9205817b0c4ff557c4eef411be2d80641e42b04e0310ba320bd09247f01fff4e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9205817b0c4ff557c4eef411be2d80641e42b04e0310ba320bd09247f01fff4e.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1672

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads