Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 08:47

General

  • Target

    736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll

  • Size

    70KB

  • MD5

    23a29461227519599e73b7d7344df468

  • SHA1

    d6b0886056d0ca2a34fa8083640ade30431473d4

  • SHA256

    736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b

  • SHA512

    85cf8b732c547f0363ddd6e2d21dbe9a7c4c8a6bd8a456bd190ce0c7874c62004245b38704fc3642d2c0b7dcc712306feff653d458f00934bf0e774f922c3bdf

  • SSDEEP

    1536:zeJBxp1/+we0Ss1UsoILrAgI9uErsjkIyeaKbRebmz0R8rT4bk:qfT1/+wXWxILEuEUkIxRbRebmwR8ru

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\736a836a4aee4b69e5eba12f0df0b891c5fd1fbddb30dcbdad47bd0a43b1ac4b.dll,#1
      2⤵
        PID:2348

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads