Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 00:19

General

  • Target

    45dbf49533c90f32e67076214771d1a7.dll

  • Size

    44KB

  • MD5

    45dbf49533c90f32e67076214771d1a7

  • SHA1

    1e016045b97a2dd567e08530c6e47fa7aa38a24c

  • SHA256

    2311f96418de3a01ec2ecb96df466a64b75e1a34ab2f7c3106b9f80835110464

  • SHA512

    a8eda8bf0a228a46b69a71ea7a2d8e97e59a72fdc4ca26153200a4eb75106f88a44607f4f08c45c1ec71678d847b3b2d7966d4c706eb5e229dfdeaac457041c8

  • SSDEEP

    768:opZJ3/5HeUQqdVODyFjMh8ES8pLpx2ePAtObKdqE1e1EWi:op3xHeudYDyFjMTSo9x2qAtObjNE5

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\45dbf49533c90f32e67076214771d1a7.dll,#1
    1⤵
      PID:2340
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\45dbf49533c90f32e67076214771d1a7.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1328

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads