Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 02:53

General

  • Target

    9a928ca410426d647db5ede0c96075c2.dll

  • Size

    30KB

  • MD5

    9a928ca410426d647db5ede0c96075c2

  • SHA1

    ebffe624c20ca0721090a0d6dc4c15506e1bf4ab

  • SHA256

    e24930916c5f02021f6bddb71e8f03737d060c2efd4982a87c3ce8a8820db417

  • SHA512

    9606f3b989c55465bd6c461c0dea418364658bb2c451a65bbc05130eb855869c6ac2c5731898ca87d07c04023fca808e01e0236ab969ccb2bf62fd2423cf9262

  • SSDEEP

    384:FLnif+j6aidFJ2FPvgrJe103G+LnA249QE6TuXLHHocbbjb41gt2c6gh3KMwwLWy:FDAa67f2FXcc3Q8XLHXbbHUfw3KEaTf0

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a928ca410426d647db5ede0c96075c2.dll,#1
    1⤵
      PID:2956
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a928ca410426d647db5ede0c96075c2.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2516

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads