Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 14:48

General

  • Target

    c3a29958481b07b56bf613f8a0e18362.dll

  • Size

    44KB

  • MD5

    c3a29958481b07b56bf613f8a0e18362

  • SHA1

    6daaf3b10accd9c45b76f9a9a9c79e965f5b7aef

  • SHA256

    2d42754199128966bf23cf52ec212c5c7252ef3800d140d26a61d401e239d8ce

  • SHA512

    f98162e8dcc22532bd3a660a1bb8b97d065c3b2124c061e02f1045be4bd6f2bc9b21de6dc7e5ead751875303915461fca498a021de5f4a071a9d13c86912afea

  • SSDEEP

    768:OY7sWg8F9QNZ00GvuhSnZ6ttEre9cTnjGa3yMuoIfopzZYiCG1voNP:j7sd8zcZ5SZfrA4n6a3yXw4UVEP

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3a29958481b07b56bf613f8a0e18362.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3a29958481b07b56bf613f8a0e18362.dll,#1
      2⤵
        PID:3068

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3068-1-0x0000000000100000-0x000000000010A000-memory.dmp

            Filesize

            40KB

          • memory/3068-0-0x0000000010000000-0x0000000010017000-memory.dmp

            Filesize

            92KB

          • memory/3068-5-0x0000000000100000-0x000000000010A000-memory.dmp

            Filesize

            40KB

          • memory/3068-6-0x0000000000100000-0x000000000010A000-memory.dmp

            Filesize

            40KB