Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:37

General

  • Target

    a85b591d59b6a6045cc65724b581aa31043cabe52b9b6865d15a35459578f953.dll

  • Size

    51KB

  • MD5

    7e792db67304b86ed1735ccbcaa20c77

  • SHA1

    4c147bd9c5b4a7296e4d0f9d723f958868b92afb

  • SHA256

    a85b591d59b6a6045cc65724b581aa31043cabe52b9b6865d15a35459578f953

  • SHA512

    0fb434ebbce0e995ea5a292d906e159658cc0d2a62fe71635d2012f4af77cb623b694cf66b41afcc258f1f314598ff2ad2d98fe46bea9958dbeb08a082804945

  • SSDEEP

    768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezwsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBbpMC6H

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a85b591d59b6a6045cc65724b581aa31043cabe52b9b6865d15a35459578f953.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a85b591d59b6a6045cc65724b581aa31043cabe52b9b6865d15a35459578f953.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads