Analysis

  • max time kernel
    296s
  • max time network
    320s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2023 21:28

General

  • Target

    Your.Only.Move.is.HUSTLE.v1.7.0/Your.Only.Move.is.HUSTLE.v1.7.0/tbfg.dll

  • Size

    1.0MB

  • MD5

    b7a07348e173ee92458c740dd4387c9b

  • SHA1

    280895870c062e2d5c1beb852883297f9923ba7c

  • SHA256

    0184a42e8390dcc3af4f19a5781b65deca5ed06082acd4a2b2dd67121b10514f

  • SHA512

    e4dd403156410c651ee48ce6fbe3bc4bff37fd25cdf334500786ef875d38c8d8b009f6631c5222195986cd56e85944faae3bd7ac25a1ce21934fd561f8827665

  • SSDEEP

    12288:Tn0OQjNONMIc7mjFlq6Xlbv96zBwpXEW1zsQP8jajsQ:1FKIMeFkelbv96zBTW1zsQP80s

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Your.Only.Move.is.HUSTLE.v1.7.0\Your.Only.Move.is.HUSTLE.v1.7.0\tbfg.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1452 -s 108
      2⤵
        PID:2244

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads