Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 17:46

General

  • Target

    d59b6b978d110a6210b03e4d3e5a3ca8b9ffec739ee1f6ff83c4aaa0546e684c.dll

  • Size

    444KB

  • MD5

    0feb0a7384f36dea44e7a83b92bfe9a4

  • SHA1

    2a585a183fad3cf0f1677f588c9399ec1157548f

  • SHA256

    d59b6b978d110a6210b03e4d3e5a3ca8b9ffec739ee1f6ff83c4aaa0546e684c

  • SHA512

    16406f8c8ec3dea5dbc94bf2070b224f37e0ad1af304513cd92ab6adb9af45bf58f3a3b57d303ca86227b5b295ee206e293659029f30a1fb2d181c6dfbbde2b2

  • SSDEEP

    12288:32vR0HPvKHSJXdUP7osqrlS5pTwvTbdpZr:3250vvKHaNUP7osUKsLbx

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d59b6b978d110a6210b03e4d3e5a3ca8b9ffec739ee1f6ff83c4aaa0546e684c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d59b6b978d110a6210b03e4d3e5a3ca8b9ffec739ee1f6ff83c4aaa0546e684c.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:2348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\27V93E5X\V5B5OBMZ.htm

    Filesize

    390KB

    MD5

    7481faf6addc52e11795d5ee6aa1ddce

    SHA1

    abc472adeb7bd67fa3f45ef1b84ca09dc3df0cb5

    SHA256

    ae4bbe44472b8d15e284ef0ec74207d38b6fb6bbe49f43f67562b9ceb0d62656

    SHA512

    6c88ef65259a16dd55ffd90322d0c97a07e397a00ff9d86cee0655398dc21e63370d87d42d377408c832a9a566ce288eba5a6126097d6a53abbc5517ddda1ac3