Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2023 21:01

General

  • Target

    75203924f4a0e43305f0490f5d02915ab5a094bbd03d47c62cf27ba9ffbfa124.dll

  • Size

    733KB

  • MD5

    79722a18fbcfbd4f1538682a728c2747

  • SHA1

    1d6f8e4a6f65cba1eedb9cdab45b82b9dc4ec559

  • SHA256

    75203924f4a0e43305f0490f5d02915ab5a094bbd03d47c62cf27ba9ffbfa124

  • SHA512

    aa16db62e722655890a1916b59d93bd5bc4366ab4c15ce0f5c9c0b7c29e848de03c7503857678d6a029354565be35ffcb60f52a5cba5da71c361c4d00aaee176

  • SSDEEP

    6144:+cGDHGz9wvylRBDKZfA23yCcJkR1/HbOi2pfsex8/G9X14Sqawfugh3X3JAO93Hl:+cGKRkylRBDqY212Fp0ZQX11qtfJ5v0

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\75203924f4a0e43305f0490f5d02915ab5a094bbd03d47c62cf27ba9ffbfa124.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\75203924f4a0e43305f0490f5d02915ab5a094bbd03d47c62cf27ba9ffbfa124.dll,#1
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads