Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2024 09:35

General

  • Target

    841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll

  • Size

    51KB

  • MD5

    cb78fd5126186f0a3eb1ba03a04b59a9

  • SHA1

    ca5492e8a225cb502d2a8b9ce06b899e0a61a14d

  • SHA256

    841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9

  • SHA512

    5cedd22936f636217b868b1628f9f4b719983162f5959baa9b16e90c6a2ab1ba4b7086f928599c55e8562c1c3655a276012973e90b3719cb4c6860b97a15e506

  • SSDEEP

    1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLMJYH5:1dWubF3n9S91BF3fbogJYH5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2456

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads