Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 17:09 UTC

General

  • Target

    Fury.dll

  • Size

    24.2MB

  • MD5

    eba0040e4ca554f83d33dc0f0b18c7fe

  • SHA1

    51290e1b3c818443fdf9d1ca38eba27184a5e95b

  • SHA256

    ff158fde8976b84f0a88eb3097820f746e98429fde57372a0a1a6ecd1d223660

  • SHA512

    8ff7e905883f15e5cbcc07940d3640cd3e4e0cae86645a97acc43a9d3272b787c5a154073b87fb2193e7da2d8622226e315c6f89f166abf8e813e04f80861a2c

  • SSDEEP

    786432:mUSzR+w9hhQnV6gnKYSp5oQrkFcE++D5:mUSIn8gnvzQrm++D5

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Fury.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Fury.dll,#1
      2⤵
        PID:1736

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.