Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 07:54

General

  • Target

    a4fb8dec7e4584c89a1ce5ef23af13acbda15f6314295886107d98b88225c344.dll

  • Size

    899KB

  • MD5

    d027541c1eeda39ab28ed1a8834e8f88

  • SHA1

    5a75b11d3e090b279d872c216ba06e8df2f7ce6e

  • SHA256

    a4fb8dec7e4584c89a1ce5ef23af13acbda15f6314295886107d98b88225c344

  • SHA512

    f4fd202b4b7da3c95025d9188eb6cea7f3df326eeb1ffba3af1fc6bd30ab8f9feb1ba7307887c89a6de7d813647b40cbf1c0b7246921ce8a76c396833fda111b

  • SSDEEP

    24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4fb8dec7e4584c89a1ce5ef23af13acbda15f6314295886107d98b88225c344.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4fb8dec7e4584c89a1ce5ef23af13acbda15f6314295886107d98b88225c344.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads