Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 08:41

General

  • Target

    a16e5de99720ac1afc5a59ab87730936.dll

  • Size

    60KB

  • MD5

    a16e5de99720ac1afc5a59ab87730936

  • SHA1

    316a9ff147e4e3709c3b29750b0f06208d0b9d51

  • SHA256

    626708cf7fe5510cb6323ed1eb711c4c12f1e6e7ba5e5ff6d47cc4bb2f3fdb37

  • SHA512

    695a8a34506004dfe93e9777855344074fcc51bdb7080fc2a1d6f67ae832c338ae5d6dfeaed7a66234199daff59e0ed2718782afbc76a067de554f3833bd3239

  • SSDEEP

    1536:33Lm4xaCgCef8zVbmQKVlxdETusYQGT2e455RsCqCVSGf:33LmMH7z58xdpsvmu5sCqCVNf

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a16e5de99720ac1afc5a59ab87730936.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a16e5de99720ac1afc5a59ab87730936.dll,#1
      2⤵
        PID:2808

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2808-3-0x0000000000160000-0x0000000000166000-memory.dmp

      Filesize

      24KB

    • memory/2808-2-0x0000000000150000-0x0000000000156000-memory.dmp

      Filesize

      24KB

    • memory/2808-1-0x0000000000150000-0x0000000000156000-memory.dmp

      Filesize

      24KB

    • memory/2808-0-0x0000000000150000-0x0000000000156000-memory.dmp

      Filesize

      24KB

    • memory/2808-4-0x0000000000160000-0x0000000000166000-memory.dmp

      Filesize

      24KB