Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:47

General

  • Target

    043c4c45e2c9c5947e9d399246328736.dll

  • Size

    48KB

  • MD5

    043c4c45e2c9c5947e9d399246328736

  • SHA1

    f2e7ba4d0cdc61261f162c51652fb17c0caf5976

  • SHA256

    c3adffc84739d328cbece43f477dfda92a3de215d53c2d0c3a6664360d6ae164

  • SHA512

    ee377cf4966ccfff49e1568d402869133f9e078fc3b5c38a79b56909a94927188f3fc1b745e7b8bda809a57a1dd8a51f6f1a2a42a6de7c54248da7626ee535ae

  • SSDEEP

    384:bwjEZjuhaHLcbzodZSRqC1a244CJ4V1MH2NbQT42Nj+pjwFnEuB+NuM5ZI1Kjr8/:4wjuQHIzqCna7TUttJbI1KjItPfl

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\043c4c45e2c9c5947e9d399246328736.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\043c4c45e2c9c5947e9d399246328736.dll,#1
      2⤵
        PID:2040

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads