Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:54

General

  • Target

    07a93f4499d62f3004e13098337ebdad.dll

  • Size

    8KB

  • MD5

    07a93f4499d62f3004e13098337ebdad

  • SHA1

    28ec75bf6b2c69a0d2ac978642833ccc8476d145

  • SHA256

    c6d2b3c7b23577b2b95f29eb1b18810fb8f47cf290d98cc8231f044850aacb6d

  • SHA512

    8f9909fc76cec3d80a5ef445975527fa2ae1d31ad8f30ea1c05a0671a0739e2cbff7c61c89767fb2fdc2f40960eaa10abcde84a0dae16472f2f3dbfe0c190aef

  • SSDEEP

    96:Cl4z8Y8A06I13jY4JP0Ea4AM5RMjE9EYafhUc:WYhU3U4ls0Ao9EPp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\07a93f4499d62f3004e13098337ebdad.dll,#1
    1⤵
      PID:2120
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\07a93f4499d62f3004e13098337ebdad.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads