Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 10:20

General

  • Target

    32725a4ea69ec50c52936c2ed99ac68a.dll

  • Size

    127KB

  • MD5

    32725a4ea69ec50c52936c2ed99ac68a

  • SHA1

    1fab8f2407f7479561addb40a5ab11c17eb787d2

  • SHA256

    b77b091fa7e63340d4ee2503888d75d74a061047d57509006f18b2b5e3d24253

  • SHA512

    c83be6807fa7a2998852f1e4ad075221a62df7cd47f56dbe1ad8a4952e780bd0a32676c119e73b521b3b4eb1ea80084b1b2bd685eba1ef807496627b137d87a1

  • SSDEEP

    3072:b1xHsSP/2z15sKm0vtTBf/ZvseLmt8YnQv2Hg:DHsS2h5pmotTB5tS7Qv

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\32725a4ea69ec50c52936c2ed99ac68a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\32725a4ea69ec50c52936c2ed99ac68a.dll,#1
      2⤵
        PID:2084

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads